Sample records for securely pair electronic

Securepairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Securepairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

SecurePairing enables two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Securepairing offers guarantees of the association partner identity and it should be resistant to eavesdropping or to a

The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

SecurityElectronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty

Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs

The electronpairing in randomly disordered lattices is studied by using an attractive Hubbard model, and by mapping the many-body problem onto a tight-binding one in a higher dimensional space, where a diagonal disorder is considered within the coherent-potential approximation. The results show an enhancement of the pair-binding energy as the self-energy difference increases in a binary alloy A x B 1-x . This fact suggests that the pairing process is highly sensitive to the one-particle localization condition. A ground-state phase diagram for on-site interaction disorder shows regions where pairing is avoided for ordered diatomic systems but not for disordered case

Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

We present, a quantum secure direct communication scheme achieved by swapping quantum entanglement. In this scheme a set of ordered Einstein-Podolsky-Rosen (HPIl) pairs is used as a quantum information channel for sending secret messages directly. After insuring the safety of the quantum channel, the sender Alice encodes the secret messages directly by applying a series local operations on her particle sequences according to their stipulation. Using three EPR pairs, three bits of secret classical information can be faithfully transmitted from Alice to remote Bob without revealing any information to a potential eavesdropper. By both Alice and Bob's GHZ state measurement results, Bob is able to read out the encoded secret messages directly. The protocol is completely secure if perfect quantum channel is used, because there is not a transmission of the qubits carrying the secret message between Alice and Bob in the public channel.

Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

Electron waiting times are an important concept in the analysis of quantum transport in nanoscale conductors. Here we show that the statistics of electron waiting times can be used to characterize Cooper pair splitters that create spatially separated spin-entangled electrons. A short waiting time between electrons tunneling into different leads is associated with the fast emission of a split Cooper pair, while long waiting times are governed by the slow injection of Cooper pairs from a superconductor. Experimentally, the waiting time distributions can be measured using real-time single-electron detectors in the regime of slow tunneling, where conventional current measurements are demanding. Our work is important for understanding the fundamental transport processes in Cooper pair splitters and the predictions may be verified using current technology.

Electron waiting times are an important concept in the analysis of quantum transport in nanoscale conductors. Here we show that the statistics of electron waiting times can be used to characterize Cooper pair splitters that create spatially separated spin-entangled electrons. A short waiting time...... between electrons tunneling into different leads is associated with the fast emission of a split Cooper pair, while long waiting times are governed by the slow injection of Cooper pairs from a superconductor. Experimentally, the waiting time distributions can be measured using real-time single......-electron detectors in the regime of slow tunneling, where conventional current measurements are demanding. Our work is important for understanding the fundamental transport processes in Cooper pair splitters and the predictions may be verified using current technology....

Highlights: • A new approach has been developed for consideration of electronpairing in metals. • Binding energy of a single pair induced by electron-phonon interaction is very small. • A new mechanism for electronpairing in metals has been considered. • Conditions for feasibility of the mechanism give conditions for electronpairing. • The mechanism gives wide opportunities to study new conditions for electronpairing. - Abstract: In an isotropic model of the electron system of metal that is presented by the Fröhlich’s initial Hamiltonian, in the approximation of a weak electron–phonon interaction at T = 0, first time, we show that the ground state of the system is the state with pairing correlations of electrons (the pair correlations of occupied electron states). In contrast to the BCS approach, the initial point in our approach is not electronpairing but is the maximum reduction of the energy of the considered system due to virtual processes of the electron–phonon interaction and to the exchange effect for the indirect electron–electron interaction (which is induced by certain phonon modes separately from others). In contrast to the BCS approach, we take into account the portion of the energy of the electron system that is connected with the above exchange effect. In the BCS approach, the corresponding portion is missed, and its role is prescribed to the portion that does not relate to the electronpairing. We show that expectation values of the above Hamiltonian for different wave functions for two interacting electrons above the Fermi sea of the non-interacting system (with interaction between the electrons that is induced by different phonon modes separately from others) are minimum for a certain structure of these functions and simultaneously for phonon modes that can induce the transitions of the interacting electrons between electron states in which they are (without violation of the Pauli exclusion principle and at everything else

The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secureelectronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

The present thesis describes the observation of muon-electronpairs in neutrino reactions. This experiment was performed using an optical multiplate spark chamber in the broad band neutrino beam of the CERN proton synchrotron. (orig.) [de

Ion pairing in electrolyte solutions remains a topic of discussion despite a long history of research. Very recently, nearest-neighbor mediated electronic de-excitation processes of core hole vacancies (electron transfer mediated decay, ETMD) were proposed to carry a spectral fingerprint of local solvation structure and in particular of contact ion pairs. Here, for the first time, we apply electron-electron coincidence detection to a liquid microjet, and record ETMD spectra of Li 1s vacancies in aqueous solutions of lithium chloride (LiCl) in direct comparison to lithium acetate (LiOAc). A change in the ETMD spectrum dependent on the electrolyte anion identity is observed for 4.5 M salt concentration. We discuss these findings within the framework of the formation and presence of contact ion pairs and the unique sensitivity of ETMD spectroscopy to ion pairing.

This paper describes a programmable trigger processor for the recognition of Cherenkov rings in a RICH counter. It identifies open electronpairs and suppresses close conversion and Dalitz pairs within 20 μs. More generally, the system can be used for correlating pixel images with pattern masks in order to locate all relatively well defined patterns of a certain type. The trigger processor consists of a systolic processor array of 160 x 176, i.e., 28,160 identical processing elements (PEs) that filter out open electronpairs, and a pseudo adder array that determines whether there was at least one such pair. The processor array is assembled of 20 x 22 VLSI chips containing 8 x 8 PEs each. The semi-custom chip has been developed in 2 μ CMOS standard cell technology

A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security. (paper)

In the presence of very deep well potential, electrons will spontaneously occupy the empty embedded bound states and electron-positron pairs are created by means of a non-perturbative tunneling process. In this work, by slowly oscillating the width or depth, the population transfer channels are opened and closed periodically. We find and clearly show that by the non-synchronous ejections of particles, the saturation of pair number in a static super-critical well can be broken, and electrons and positrons can be pumped inexhaustibly from vacuum with a constant production rate. In the adiabatic limit, final pair number after a single cycle has quantized values as a function of the upper boundary of the oscillating, and the critical upper boundaries indicate the diving points of the bound states.

The authors review the status of experiments to study the electron positron pair creation in heavy ion atom collisions at bombarding energies close to the Coulomb barrier. The disentanglement and characterization of various sources of positrons observed in such collisions are described with a focus on the monoenergetic electron positron pairs observed. They seem to originate from the two-body decay of a family of neutral particles with masses of about 3m and lifetimes in the range of 6 x 10 - 14 s, produced by high Coulomb fields. First attempts were made to create these particles by resonant Bhabha scattering

The production of positron-electronpairs in collisions of 238 U+ 232 Th at 5.95 MeV/nucleon, and of 238 U+ 181 Ta at 5.95, 6.1, and 6.3 MeV/nucleon, has been studied with the APEX spectrometer at Argonne National Laboratory. Several analyses have been performed to search for sharp structures in sum-energy spectra for positron-electronpairs. Such features have been reported in previous experiments. No statistically convincing evidence for such behavior is observed in the present data. (c) 1999 The American Physical Society

Triply differential probability rates for electron-positron pair creation in laser-nucleus collisions, calculated within the S-matrix approach, are investigated as functions of the nuclear recoil. Pronounced enhancements of differential probability rates of multiphoton pair production are found for a nonzero momentum transfer from the colliding nucleus. The corresponding rates show a very dramatic dependence on the polarization of the laser field impinging on the nucleus; only for a linearly polarized light are the multiphoton rates for electron-positron pair production considerably large. We focus therefore on this case. Our numerical results for different geometries of the reaction particles demonstrate that, for the linearly polarized laser field of an infinite extent (which is a good approximation for femtosecond laser pulses), the pair creation is far more efficient if the nucleus is detected in the direction of the laser-field propagation. The corresponding angular distributions of the created particles show that the high-energy pairs are predominantly produced in the plane spanned by the polarization vector and the laser-field propagation direction, while the low-energy pairs are rather spread around the latter of the two directions. The enhancement of differential probability rates at each energy sector, defined by the four-momentum conservation relation, is observed with varying the energy of the produced particles. The total probability rates of pair production are also evaluated and compared with the corresponding results for the case when one disregards the recoil effect. A tremendous enhancement of the total probability rates of the electron-positron pair creation is observed if one takes into account the nuclear recoil.

The hot thermal accretion disks of the 1970s are studied and consideration is given to the effects of electron-positron pairs, which were originally neglected. It is found that disks cooled by internally produced photons have a critical accretion rate above which equilibrium is not possible in a radial annulus centered around r = 10 GM/c-squared, where M is the mass of the central object. This confirms and extends previous work by Kusunose and Takahara. Above the critical rate, pairs are created more rapidly than they can be destroyed. Below the critical rate, there are two solutions to the disk structure, one with a high pair density and one with a low pair density. Depending on the strength of the viscosity, the critical accretion rate corresponds to a critical luminosity of about 3-10 percent of the Eddington limit. 32 refs

The authors point out the possibility that the high transition temperatures of the recently discovered oxide superconductors are dominantly caused by the inter-layer Cooper pairing of two-dimensional electrons that are coupled through the exchange of three-dimensional phonons. (author)

The phenomenon of internal electron-positron pair production by excited nuclei is briefly reviewed. The advantages of this phenomenon in nuclear structure investigations are pointed. The new Si(Li)-Si(Li) electron spectrometer with superconducting magnetic transporter (SMS) built at ATOMKI, Hungary, was tested for detection of internal electron-positron pair production events. Proton beam of a Van de Graaff accelerator of 5 MV was used to excite the target nuclei of sup(27)Al, sup(42)Ca and sup(19)F. The internal pair production coefficients were measured and compared with the data of literature. The detection efficiency of SMS is calculated to be (37+-7)%. The test proved that the SMS is suitable for nuclear structure investigations producing electron-positron pairs. The SMS of ATOMKI is recently the top instrument all over the world in this field: its detection efficiency, energy resolution and applicability for multipolarity identification are much better than these properties of other detectors. (D.Gy.)

The Korringa-Kohn-Rostoker (KKR) Green function extended-defect formalism, used to describe the scattering of Bloch electrons in a dilute alloy, is generalised to include an asymmetric defect centred on a lattice site. The revised theory is then used to investigate conduction electron scattering from Frenkel pairs in Cu. Such defects consist of two self-interstitial atoms centred on a vacant lattice site forming a dumb-bell oriented along the <100> axis. The generalised formalism allows one to calculate the cluster t matrix T for the Frenkel pair cluster including the surrounding displaced nearest neighbours. It was found that the interstitials at the vacant lattice site could still be treated within the muffin-tin potential as a central scatterer characterised by a t matrix which is non-diagonal in the angular momentum. Electron scattering rates and Dingle temperatures are calculated and discussed in view of preliminary experimental results.

The Korringa-Kohn-Rostoker (KKR) Green function extended-defect formalism, used to describe the scattering of Bloch electrons in a dilute alloy, is generalised to include an asymmetric defect centred on a lattice site. The revised theory is then used to investigate conduction electron scattering from Frenkel pairs in Cu. Such defects consist of two self-interstitial atoms centred on a vacant lattice site forming a dumb-bell oriented along the axis. The generalised formalism allows one to calculate the cluster t matrix T for the Frenkel pair cluster including the surrounding displaced nearest neighbours. It was found that the interstitials at the vacant lattice site could still be treated within the muffin-tin potential as a central scatterer characterised by a t matrix which is non-diagonal in the angular momentum. Electron scattering rates and Dingle temperatures are calculated and discussed in view of preliminary experimental results. (author)

It is shown that a shift of an electron band with electron occupation number n, which is changing during the transition to the superconducting state, can lower the total energy of the system. In fact it will bring a negative contribution to the pairing potential, which is proportional to the product of the electron band shift with occupation number and the charge transfer during the transition to the superconducting state. The shift of the electron band comes from the change of stresses and the change of correlation effects in the CuO 2 plane with n, that in turn is caused by the changing oxygen concentration. This model explains the phenomenological success of Hirsch's model, which gives no explanation how the band shift in energy can give rise to superconductivity. (orig.)

We discuss the four requirements for a real point-to-point quantum secure direct communication (QSDC) first, and then present two efficient QSDC network schemes with an N ordered Einstein-Podolsky-Rosen pairs. Any one of the authorized users can communicate another one on the network securely and directly

The process of electron-positron pair production is investigated within the phase-space Wigner formalism. The similarities between atomic ionization and pair production for homogeneous, but time-dependent linearly polarized electric fields are examined mainly in the regime of multiphoton absorption (field-dependent threshold, above-threshold pair production). Characteristic signatures in the particle spectra are identified (effective mass, channel closing). The non-monotonic dependence of the particle yield on the carrier frequency is discussed as well. The investigations are then extended to spatially inhomogeneous electric fields. New effects arising due to the spatial dependence of the effective mass are discussed in terms of a semi-classical interpretation. An increase in the normalized particle yield is found for various field configurations.Pair production in inhomogeneous electric and magnetic fields is also studied. The influence of a time-dependent spatially inhomogeneous magnetic field on the momentum spectrum and the particle yield is investigated. The Lorentz invariants are identified to be crucial in order to understand pair production by strong electric fields in the presence of strong magnetic fields. (author) [de

Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

We review here the status of experiments to study the electron positron pair creation in heavy ion atom collisions at bombarding energies close to the Coulomb barrier. The disentanglement and characterisation of various sources of positrons observed in such collisions are described with a focus on the monoenergetic electron positron pairs observed. They seem to originate from the two-body decay of a family of neutral particles with masses of about 3 m e and life times in the range of 6x10 -14 s -10 s, produced by high Coulomb fields. First attempts were made to create these particles by resonant Bhabha scattering. First we present some experimental methods for high efficiency positron spectroscopy in heavy ion collisions. Then we describe the discovery of positron creation induced by strong time changing Coulomb fields. (orig./HSI)

We examine the creation of electron-positron pairs in a very strong force field. Using numerical solutions to quantum field theory we calculate the spatial and momentum probability distributions for the created particles. A comparison with classical mechanical phase space calculations suggests that despite the fully relativistic and quantum mechanical nature of the matter creation process, most aspects can be reproduced accurately in terms of classical mechanics

Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patientÃ¢Â€Â™s medical history and payment for private medical services. The security issue is a very important one as the patientÃ¢Â€Â™s history is confidential and the payment has to be safe.

With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

Full Text Available The elementary electron-positron pair formation process is consideredin terms of a revised quantum electrodynamic theory, with specialattention to the conservation of energy, spin, and electric charge.The theory leads to a wave-packet photon model of narrow line widthand needle-radiation properties, not being available from conventionalquantum electrodynamics which is based on Maxwell's equations. Themodel appears to be consistent with the observed pair productionprocess, in which the created electron and positron form two raysthat start within a very small region and have original directionsalong the path of the incoming photon. Conservation of angular momentum requires the photon to possess a spin, as given by the present theory but not by the conventional one. The nonzero electric field divergence further gives rise to a local intrinsic electric charge density within the photon body, whereas there is a vanishing total charge of the latter. This may explain the observed fact that the photon decays on account of the impact from an external electric field. Such a behaviour should not become possible for a photon having zero local electric charge density.

By applying ultrafast optical spectroscopy to electron-doped La1.9Ce0.1CuO4 ±δ , we discern a bosonic mode of electronic origin and provide the evolution of its coupling with the charge carriers as a function of temperature. Our results show that it has the strongest coupling strength near Tc and can fully account for the superconducting pairing. This mode can be associated with the two-dimensional antiferromagnetic spin correlations emerging below a critical temperature T† larger than Tc. Our work may help to establish a quantitative relation between bosonic excitations and superconducting pairing in electron-doped cuprates.

This paper addresses the definition of correlation energy within 4-component relativistic atomic and molecular calculations. In the nonrelativistic domain the correlation energy is defined as the difference between the exact eigenvalue of the electronic Hamiltonian and the Hartree-Fock energy. In practice, what is reported is the basis set correlation energy, where the “exact” value is provided by a full Configuration Interaction (CI) calculation with some specified one-particle basis. The extension of this definition to the relativistic domain is not straightforward since the corresponding electronic Hamiltonian, the Dirac-Coulomb Hamiltonian, has no bound solutions. Present-day relativistic calculations are carried out within the no-pair approximation, where the Dirac-Coulomb Hamiltonian is embedded by projectors eliminating the troublesome negative-energy solutions. Hartree-Fock calculations are carried out with the implicit use of such projectors and only positive-energy orbitals are retained at the correlated level, meaning that the Hartree-Fock projectors are frozen at the correlated level. We argue that the projection operators should be optimized also at the correlated level and that this is possible by full Multiconfigurational Self-Consistent Field (MCSCF) calculations, that is, MCSCF calculations using a no-pair full CI expansion, but including orbital relaxation from the negative-energy orbitals. We show by variational perturbation theory that the MCSCF correlation energy is a pure MP2-like correlation expression, whereas the corresponding CI correlation energy contains an additional relaxation term. We explore numerically our theoretical analysis by carrying out variational and perturbative calculations on the two-electron rare gas atoms with specially tailored basis sets. In particular, we show that the correlation energy obtained by the suggested MCSCF procedure is smaller than the no-pair full CI correlation energy, in accordance with the

Fermi-Dirac integrals for partially relativistic, partially degenerate, electron gas are tabulated, especially for the region of electron-positron pair-creation in equilibrium with radiation field. Electrons are treated to be non-interacting particles. Independent entries for the table are non-dimensional temperature and a degeneracy parameter which is related directly with matter density. Thermodynamical quantities and their partial derivatives with respect to density and temperature are also given in table, which are intended for use in computing stellar evolution by means of a Henyey-type technique. This table is a supplement to one published earlier, in which only electrons were taken into account explicitly.

A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)

In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secureelectronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

This comprehensive survey deliberated over the security of electronic payment systems. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system i.e. EMV including several researches at Cambridge university to designate variant types of attacks against this standard which demonstrates lack of a secure "o...

% WA99 \\\\ \\\\ Large transient Coulomb fields, which are generated in collisions of high-Z systems at sufficiently high energies, lead to copious production of electron-positron pairs. It has been suggested that these lepton pairs might mask signals arising from plasma phase interaction. Pair-production cross-sections have been calculated by several authors with results that differ significantly from each other. For very heavy ions and high energies, multiple pairs are expected to be formed even in single peripheral collisions. Perturbative and nonperturbative treatments lead to various predictions for the fractions of multiple pair formation out of the total cross-sections. Some of the electrons produced will be captured into bound states of the ion, thereby, reducing its charge state by one unit. This process which has been termed $^{\\prime\\prime}$Electron Capture from Pair Production$^{\\prime\\prime}$, represents the only electron capture process which increases with energy, and as such, will dominate all oth...

An achromatic geminate nuclear electron selector (AGNES) has been constructed for in-beam electron spectroscopy. It is essentially a pair of triple-focussing electron spectrum selectors (TESS). It consists of a pair of sector magnets with a field index n = 0. Conversion electrons emitted at 90 0 and 180 0 with respect to the beam axis are transported achromatically through the pair of sector magnets to two focussing points. Electrons are triply focussed in radial, vertical and momentum axes, and their energies are analyzed by cooled Si(Li) detectors. It has a large solid angle of 50 msr x 2 and a large momentum range of 57%. It is quite useful not only for measuring conversion coefficients and electron anisotropy but also for nuclear electronpairs. (orig.)

ElectronicSecurity Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

Full Text Available Electron–positron pair production due to the decay of vacuum in ultrastrong laser fields is an interesting topic which is revived recently because of the rapid development of current laser technology. The theoretical and numerical research progress of this challenging topic is reviewed. Many new findings are presented by different approaches such as the worldline instantons, the S-matrix theory, the kinetic method by solving the quantum Vlasov equation or/and the real-time Dirac–Heisenberg–Wigner formalism, the computational quantum field theory by solving the Dirac equation and so on. In particular, the effects of electric field polarizations on pair production are unveiled with different patterns of created momentum spectra. The effects of polarizations on the number density of created particles and the nonperturbative signatures of multiphoton process are also presented. The competitive interplay between the multiphoton process and nonperturbation process plays a key role in these new findings. These newly discovered phenomena are valuable to deepen the understanding of pair production in complex fields and even have an implication to the study of strong-field ionization. More recent studies on the pair production in complex fields as well as beyond laser fields are briefly presented in the view point of perspective future.

We have measured angular and momentum distributions for electrons and positrons created as pairs in peripheral collisions of 6.4 TeV bare sulfur ions with fixed targets of Al, Pd, and Au. Singly- and doubly-differential cross sections have been determined for 1--17 MeV/c electrons and positrons detected independently and in coincidence as pairs. Integrated yields for pair production are found to vary as the square of the target nuclear charge. Relative angular and momentum differential cross sections are effectively target independent. Probability distributions for the pair total momentum, the positron fraction of the pair momentum, and the pair traverse momentum have been derived from the coincident electron-positron data

Coupled-electronpair approximations (CEPAs) and coupled-pair functionals (CPFs) have been popular in the 1970s and 1980s and have yielded excellent results for small molecules. Recently, interest in CEPA and CPF methods has been renewed. It has been shown that these methods lead to competitive thermochemical, kinetic, and structural predictions. They greatly surpass second order Moller-Plesset and popular density functional theory based approaches in accuracy and are intermediate in quality between CCSD and CCSD(T) in extended benchmark studies. In this work an efficient production level implementation of the closed shell CEPA and CPF methods is reported that can be applied to medium sized molecules in the range of 50-100 atoms and up to about 2000 basis functions. The internal space is spanned by localized internal orbitals. The external space is greatly compressed through the method of pair natural orbitals (PNOs) that was also introduced by the pioneers of the CEPA approaches. Our implementation also makes extended use of density fitting (or resolution of the identity) techniques in order to speed up the laborious integral transformations. The method is called local pair natural orbital CEPA (LPNO-CEPA) (LPNO-CPF). The implementation is centered around the concepts of electronpairs and matrix operations. Altogether three cutoff parameters are introduced that control the size of the significant pair list, the average number of PNOs per electronpair, and the number of contributing basis functions per PNO. With the conservatively chosen default values of these thresholds, the method recovers about 99.8% of the canonical correlation energy. This translates to absolute deviations from the canonical result of only a few kcal mol(-1). Extended numerical test calculations demonstrate that LPNO-CEPA (LPNO-CPF) has essentially the same accuracy as parent CEPA (CPF) methods for thermochemistry, kinetics, weak interactions, and potential energy surfaces but is up to 500

Security, privacy and ethics in electronic records management in the South African public sector. ... Computers have become such valuable tools for conducting business ... One great advantage of the computers is the ease with which a large

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

Spin density functional theory is used to describe the interaction between solvated electrons in KCl in the high dilution limit. In agreement with recent calculations based on the path integral method our results for antiparallel spin predict a strong tendency to form localized bielectronic complexes. At variance with numerical path integral, our method can efficiently treat the case of parallel spins. For this case we find that electrons repel each other and localize into separate F-center-like states.

This paper examines the potential significance of updating registration practices in resolving some of the issues about tenure security in a transformative context. It deals with the importance of good governance in the context of land administration and considers its impact on intended reforms. Land registration practice as an ...

The ever-changing world of securityelectronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secureelectronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.

Correlated wave functions are used for YBa2Cu3O(7-y) where epsilon(d)-epsilon(p) is about 0 for Cu3d- and 02p-electrons. The electrons are delocalized (metallic) for y less than 0.5 with weak and temperature-independent paramagnetism. In contrast, the systems are conventional antiferromagnetic insulators for y greater than 0.6 with a narrow y between 0.5 and 0.6 transition region. These results are in agreement with magnetic and neutron diffraction data.

and that this is possible by full Multiconfigurational Self-Consistent Field (MCSCF) calculations, that is, MCSCF calculations using a no-pair full CI expansion, but including orbital relaxation from the negative-energy orbitals. We show by variational perturbation theory that the MCSCF correlation energy is a pure MP2....... The well-known 1/Z- expansion in nonrelativistic atomic theory follows from coordinate scaling. We point out that coordinate scaling for consistency should be accompanied by velocity scaling. In the nonrelativistic domain this comes about automatically, whereas in the relativistic domain an explicit...... scaling of the speed of light is required. This in turn explains why the relativistic correlation energy to the lowest order is not independent of nuclear charge, in contrast to nonrelativistic theory....

Full Text Available Electronic Health Record EHR systems enhance efficiency and effectiveness in handling patients information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting the system and reviewing the implemented security safeguards. The study was done at a referral hospital level 6 government facility in Kenya. Purposive sampling was used to select a sample of 196 out of 385 staff and a questionnaire designed for qualitative data collection. Data was analyzed using SPSS software. Correlations and binary logistic regression were obtained. Binary Logistic Regression BLR was used to establish the effect of the safeguards predictors on EHR security. It was established that physical security contributes more to the security of an information system than administrative controls and technical controls in that order. BLR helped in predicting effective safeguards to control EHR security threats in limited resourced public health facilities.

This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

Large transient Coulomb fields, which are generated in collisions of high-Z systems at sufficiently high energies, lead to copious production of electron-positron pairs. It has been suggested that these lepton pairs might mask signals arising from plasma phase interaction. Pair-production cross sections have been calculated by several authors with results which differ significantly from each other. Some of the electrons produced may be captured into bound states of the ion, thereby, reducing its charge state by one unit. This process which has been termed ``Electron Capture from Pair Production``, represents the only electron capture pro which increases with energy, and as such, will dominate all others in the ultrarelativistic energy regime. Ions having undergone this process would be lost from storage-type accelerators. The absolute cross sections for capture have been calculated with results which differ by as much as an order of magnitude. If as large as some of the calculations predict, Relativistic Heav...

The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, a case study where we apply the proposed model, a new scheme for remote electronic voting, and three case studies of commercial online banking solutions in Norway.

A workshop on Position-ElectronPairs in Astrophysics was held in 1983 at the Goddard Space Flight Center. This workshop brought together observers and theorists actively engaged in the study of astrophysical sites, as well as physical processes therein where position-electronpairs have a profound influence on both the overall dynamics of the source region and the properties of the emitted radiation. This volume consists of the workshop proceedings

The electronic mechanisms induced by the UV exposure of thin films of polyvinyl alcohol doped with pairs of mixed valence metal ions were studied in relation to their optical behaviour by Moessbauer spectroscopy and optical absorption. The results obtained definitely point to the role of each element from the pair in the electronic mechanism involved, with influence on the optical properties regarding applications in real-time holography and integrated optics

Employing the continuum dielectric model for electronic polarizability, we have developed a new consistent procedure for parameterization of the effective nonpolarizable potential of liquid water. The model explains the striking difference between the value of water dipole moment μ~3D reported in recent ab initio and experimental studies with the value μeff~2.3D typically used in the empirical potentials, such as TIP3P or SPC/E. It is shown that the consistency of the parameterization scheme can be achieved if the magnitude of the effective dipole of water is understood as a scaled value μeff=μ∕εel, where εel =1.78 is the electronic (high-frequency) dielectric constant of water, and a new electronic polarization energy term, missing in the previous theories, is included. The new term is evaluated by using Kirkwood - Onsager theory. The new scheme is fully consistent with experimental data on enthalpy of vaporization, density, diffusion coefficient, and static dielectric constant. The new theoretical framework provides important insights into the nature of the effective parameters, which is crucial when the computational models of liquid water are used for simulations in different environments, such as proteins, or for interaction with solutes. PMID:25383062

Electronic commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations...

Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

Influence of Cooper pair fluctuations that are precursor of pairing of electrons and holes located on opposite surfaces of topological insulator film on tunnel conductivity between the surfaces is investigated. Due to restrictions caused by momentum and energy conservation dependence of tunnel conductivity on external bias voltage has peak that becomes more prominent with decreasing of disorder and temperature. We have shown that Cooper pair fluctuations considerably enhance tunneling and height of the peak diverges in vicinity of critical temperature with critical index ν = 2. Width of the peak tends to zero in proximity of critical temperature. Pairing of electrons and holes can be suppressed by disorder and in vicinity of quantum critical point height of the peak also diverges as function of Cooper pair damping with critical index μ = 2.

Munjal, D. [Department of Physics and Astrophysics, University of Delhi (India); Department of Physics, Swami Shraddhanand College, University of Delhi (India); Prasad, V. [Department of Physics, Swami Shraddhanand College, University of Delhi (India)

2017-02-15

Two electron systems confined by harmonic potential is known as harmonium. Such a system has been studied for many reasons in the literature. In this work we study harmonium under Debye potential. We use higher order finite difference method for the solution of Schrodinger equation. Complete energy spectrum of harmonium and harmonium under Debye potential is studied. Debye screening length shows considerable effect on the energy levels and the radial matrix elements. The results are analysed in the light of existing results and the comparison with available results shows remarkable agreement. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

We investigate the electron-positron pair production in a hot accretion plasma around a supermassive black hole in connection with active galactic nuclei. Assuming that an optically thin two-temperature plasma is produced in the vicinity of the central black hole, we examine the condition for the significant pair production by comparing relevant time scales. Since the pair production is dominated by collisions between hard photons, the conditions for significant pair production depend on the production rate of hard photons. We examine the case where the unsaturated Comptonization of soft photons produces hard photons as well as that of bremsstrahlung. We show that significant pair production occurs for a moderately high accretion rate with relatively slow accretion flow as compared to the free fall velocity in both cases. Possible consequences of pair production are briefly discussed. (author)

It is shown from first principles that, in the periodic potential of a crystalline solid, short-range (i.e., screened) binary Coulomb interactions can lead to a two-electron bound state. It is further suggested that these composite bosonic states (charge -2e, and typically spin zero) could mediate an effectively attractive interaction between pairs of conduction electrons close to the Fermi level. This necessarily short range attractive interaction, which is crucially dependent on the band structure of the solid, and is complementary to the phonon-mediated one, may provide a source for the existence and properties of short correlation-length electronpairs (analogous to but distinct from Cooper pairs) needed to understand high temperature superconductivity. Several distinctive and observable characteristics of the proposed pairing scheme are discussed

Full Text Available The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in performing its obligation reflect the concrete aspect. Warranty provides protection security for related parties with some governing regulations during transaction. However, some other supporting components have not been effectively contribute to balance the utilization of technology in trading. Keywords: legal security, trading, cellphone, electronic media

The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

Graphical abstract: The electron-phonon interactions destroy the electronpairs formed by Coulomb interactions, and at the same time, form the energy gap by which the electronpairs become stable. - Abstract: In order to discuss how the nondissipative delocalized diamagnetic currents in the microscopic sized materials are closely related to the conventional superconductivity in the macroscopic sized materials, the unified theory, by which various sized superconductivity can be explained, is suggested. It has been believed for a long time that the electron-phonon interactions play an essential role in the attractive electron-electron interactions, as described in the Bardeen-Cooper-Schrieffer (BCS) theory in the conventional superconductivity. However, it is suggested in this paper that the electron-phonon interactions do not play an essential role in the attractive electron-electron interactions but play an essential role in the forming of energy gap by which the electronpairs formed by the attractive Coulomb interactions in the conventional superconducting states become more stable than those in the normal metallic states at low temperatures.

Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

Two dimensional nonlinear electrostatic waves are studied in unmagnetized, dissipative pair-ion-electron plasmas in the presence of weak transverse perturbation. The dissipation in the system is taken into account by incorporating the kinematic viscosity of both positive and negative ions. In the linear case, a biquadratic dispersion relation is obtained, which yields the fast and slow modes in a pair-ion-electron plasma. It is shown that the limiting cases of electron-ion and pair-ion can be retrieved from the general biquadratic dispersion relation, and the differences in the characters of the waves propagating in both the cases are also highlighted. Using the small amplitude approximation method, the nonlinear Kadomtsev Petviashvili Burgers as well as Burgers-Kadomtsev Petviashvili equations are derived and their applicability for pair-ion-electron plasma is explained in detail. The present study may have relevance to understand the formation of two dimensional electrostatic shocks in laboratory produced pair-ion-electron plasmas.

We determine the eigenvalues of the two-site Hubbard molecule with one electron and one positron to describe the characteristics of electron-positron interactions in solids. While the effect of hopping is, in general, opposite to the effect of on-site interaction, we find a complex scenario for the electron-positron pair with a non-vanishing potential drop. We give analytical solutions and discuss the combined effects of the model parameters.

We determine the eigenvalues of the two-site Hubbard molecule with one electron and one positron to describe the characteristics of electron-positron interactions in solids. While the effect of hopping is, in general, opposite to the effect of on-site interaction, we find a complex scenario for the electron-positron pair with a non-vanishing potential drop. We give analytical solutions and discuss the combined effects of the model parameters.

We calculate the cross sections for the production of one and more electron-positron pairs due to the strong electromagnetic fields in relativistic heavy-ion collisions. We derive the N-pair amplitude using the generating functional of fermions in an external field and the path-integral formalism. The N-pair production probability is found to be an approximate Poisson distribution. We calculate total cross sections for the production of one pair in lowest order, including corrections from the Poisson distribution up to third order. Furthermore, we calculate cross sections for the production of up to five pairs including corrections from the Poisson distribution. copyright 1997 The American Physical Society

Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

In this paper, we propose a framework for low cost secureelectronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a national infrastructure for exchanging medical patient records among authorized parties (particularly, physicians), the EPD has to address a number of requirements, ranging from

In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a mandatory infrastructure for exchanging medical records of most if not all patients in the Netherlands among authorized parties (particularly, physicians), the EPD has to address

The specific, local modification of the electronic structure of carbon nanomaterials is as important for novel electronic device fabrication as the doping in the case of silicon-based electronics. Here, we report low temperature scanning tunneling microscopy and spectroscopy study of semiconducting carbon nanotubes subjected to hydrogen-plasma treatment. We show that plasma treatment mostly results in the creation of pairedelectronic states in the nanotube band gap. Combined with extensive first-principle simulations, our results provide direct evidence that these states originate from correlated chemisorption of hydrogen adatoms on the tube surface. The energy splitting of the paired states is governed by the adatom-adatom interaction, so that controlled hydrogenation can be used for engineering the local electronic structure of nanotubes and other sp 2 -bonded nanocarbon systems

Resonant ion-pair formation from the collisions of NO + ions with electrons was studied using the heavy-ion storage ring CRYRING at the Manne Siegbahn Laboratory of Stockholm University. The total cross section is measured for the formation of N + +O - for electron energies 8--18 eV, and the results are compared with ion-pair formation in photoionization work. A peak in the cross section is observed at 12.5 eV, with a magnitude of 8.5 x 10 -19 cm 2 . An attempt to extract the cross section for the reverse process of associative ionization is made

Full Text Available Neuromorphic devices with paired pulse facilitation emulating that of biological synapses are the key to develop artificial neural networks. Here, phosphorus-doped nanogranular SiO2 electrolyte is used as gate dielectric for protonic/electronic hybrid indium gallium zinc oxide (IGZO synaptic transistor. In such synaptic transistors, protons within the SiO2 electrolyte are deemed as neurotransmitters of biological synapses. Paired-pulse facilitation (PPF behaviors for the analogous information were mimicked. The temperature dependent PPF behaviors were also investigated systematically. The results indicate that the protonic/electronic hybrid IGZO synaptic transistors would be promising candidates for inorganic synapses in artificial neural network applications.

The dissociative chemisorption of methane on metal surfaces has attracted much attention in recent years as a prototype of gas-surface reactions in understanding the mode specific and bond selective chemistry. In this work, we systematically investigate the influence of electron-hole pair excitations on the dissociative chemisorption of CH{sub 4}/CH{sub 3}D/CHD{sub 3} on Ni(111). The energy dissipation induced by surface electron-hole pair excitations is modeled as a friction force introduced in the generalized Langevin equation, in which the independent atomic friction coefficients are determined within the local-density friction approximation. Quasi-classical trajectory calculations for CH{sub 4}/CH{sub 3}D/CHD{sub 3} have been carried out on a recently developed twelve-dimensional potential energy surface. Comparing the dissociation probabilities obtained with and without friction, our results clearly indicate that the electron-hole pair effects are generally small, both on absolute reactivity of each vibrational state and on the mode specificity and bond selectivity. Given similar observations in both water and methane dissociation processes, we conclude that electron-hole pair excitations would not play an important role as long as the reaction is direct and the interaction time between the molecule and metal electrons is relatively short.

Topological superconductors are a very interesting and frontier topic in condensed matter physics. Despite the tremendous efforts in exploring topological superconductivity, its presence is however still under heavy debate. The Dirac electrons have been proven to exist on the surface of a topological insulator. It remains unclear whether and how the Dirac electrons fall into Cooper pairing in an intrinsic superconductor with the topological surface states. Here we show the systematic study of scanning tunnelling microscope/spectroscopy on the possible topological superconductor SrxBi2Se3. We first demonstrate that only the intercalated Sr atoms can induce superconductivity. Then we show the full superconducting gaps without any in-gap density of states as expected theoretically for a bulk topological superconductor. Finally, we find that the surface Dirac electrons will simultaneously condense into the superconducting state within the superconducting gap. This vividly demonstrates how the surface Dirac electrons are driven into Cooper pairs. PMID:28198378

The production of electron-positron pairs with the capture of the electron in an atomic orbital is investigated for the conditions of the Relativistic Heavy Ion Collider (RHIC) and the Large Hadron Collider (LHC). Dirac wave functions for the leptons are used, taking corrections to orders of Z{alpha} into account. The dependence on the transverse momentum transfer is studied and the accuracy of the equivalent photon approximation is discussed as a function of the nuclear charge.

Coupled channel calculations are performed for electron-positron pair production in relativistic collisions of heavy ions. For this purpose the wavefunction is expanded into different types of basis sets consisting of atomic wavefunctions centred around the projectile ion only and around both of the colliding nuclei. The results are compared with experimental data from Belkacem et al (1997 Phys. Rev. A 56 2807).

Circle Feynman diagrams for a specific permutation of variables along with their corresponding algebraic expressions are presented to evaluate [H] 2 for proton-proton electron-positron pair production. A Monte Carlo integration technique is introduced and is used to set up the multiple integral expression for the total pair production cross section. The technique is first applied to the Compton scattering problem and then to an arbitrary multiple integral. The relativistic total cross section for proton-proton electron-positron pair production was calculated for eight different values of incident proton energy. A variety of differential cross sections were calculated for the above energies. Angular differential cross section distributions are presented for the electron, positron, and proton. Invariant mass differential cross section distributions are done both with and without the presence of [H] 2 . Both WGHT and log 10 (TOTAL) distributions were also obtained. The general behavioral trends of the total and differential cross sections for proton-proton electron-positron pair production are presented. The range of validity for this calculation is from 0 to about 200 MeV

A superconducting pairing mechanism is suggested, mediating by collective and coherent cluster fluctuations in the materials. The model, based on a geometrical frustration, proposes a dynamic effect driven by a special short-range electronic instability. Experimental support for this model is discussed

The creation of electron-positron pairs constitutes an example for the conversion of energy into mass. We here give a brief outline of the various processes and theoretical approaches in a simple fashion. We point out some recent results and difficulties that have yet to be overcome

Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthc...

In the Born approximation of the perturbation theory considered is a nonlinear effect of the electron-positron pair production by two identical photons in the Coulomb field of an atomic nucleus. The kinematic version of identical photons is studied. All the particles are considered to be nonpolarized. The calculation of the differential probability of the effect has been carried out earlier by the Feynman method. The total probability of the effect in limiting energy ranges is determined by integrating the formulas of the pair component distribution over energies. The probabilities of the electron-positron pair production and fusion of two photons into one in the nucleus field have been compared for the case of identical quanta. From the comparison of the results of analyzing both the nonlinear effects it follows that in the high-energy range the electron-positron pair production by two identical photons in the nucleus field extremely predominates over the fusion of two photons into one photon in the same field

An important parameter in the study of reacting radical systems is the electron exchange interaction, J. The properties of interest are the sign and magnitude of J, and its functional dependence on distance between radicals. One source of information about J is from understanding the Chemically Induced Dynamic Electron Polarization (CIDEP) which is observed in the EPR spectra of reactive radical systems. For radicals reacting in solution to form new covalent bonds, it has generally been found that J O. It is suggested that F-pairs react at a separation greater than that at which spin correlated (geminate) pairs of the same radicals are formed, so that the intervening solvent molecules become involved in the exchange interaction giving rise to J>O via some sort of superexchange process. This is an interesting proposition since superexchange via solvent molecules may play a role in rates of long-distance electron transfer reactions and in the electron transfer reactions of photosynthesis. However, the model suggested runs contrary to all F-air radicals are produced. In order to clarify this important point, the authors present here a definitive study in which we examine several systems of radgenerated independently (exclusive F-pairs) by pulsed laser photolysis and pulsed radiolicals generatedysis in aqueous, alcoholic and hydrocarbon solvents

We describe how the semiclassical theory of radical pair recombination reactions recently introduced by two of us [D. E. Manolopoulos and P. J. Hore, J. Chem. Phys. 139, 124106 (2013)] can be generalised to allow for different singlet and triplet recombination rates. This is a non-trivial generalisation because when the recombination rates are different the recombination process is dynamically coupled to the coherent electron spin dynamics of the radical pair. Furthermore, because the recombination operator is a two-electron operator, it is no longer sufficient simply to consider the two electrons as classical vectors: one has to consider the complete set of 16 two-electron spin operators as independent classical variables. The resulting semiclassical theory is first validated by comparison with exact quantum mechanical results for a model radical pair containing 12 nuclear spins. It is then used to shed light on the spin dynamics of a carotenoid-porphyrin-fullerene triad containing considerably more nuclear spins which has recently been used to establish a “proof of principle” for the operation of a chemical compass [K. Maeda, K. B. Henbest, F. Cintolesi, I. Kuprov, C. T. Rodgers, P. A. Liddell, D. Gust, C. R. Timmel, and P. J. Hore, Nature (London) 453, 387 (2008)]. We find in particular that the intriguing biphasic behaviour that has been observed in the effect of an Earth-strength magnetic field on the time-dependent survival probability of the photo-excited C ·+ PF ·− radical pair arises from a delicate balance between its asymmetric recombination and the relaxation of the electron spin in the carotenoid radical

The dynamical Schwinger effect of vacuum pair creation driven by an intense external laser pulse is studied on the basis of quantum kinetic theory. The numerical solutions of these kinetic equations exhibit a complex time dependence which makes an analysis of the physical processes difficult. In particular, the question of secondary effects, such as creation of secondary annihilation photons from the focus spot of the colliding laser beams, remains an important open problem. In the present work we, therefore, develop a perturbation theory which is able to capture the dominant time dependence of the produced electron-positron pair density. The theory shows excellent agreement with the exact kinetic results during the laser pulse, but fails to reproduce the residual pair density remaining in the system after termination of the pulse. (copyright 2013 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

In the present work, the information gained by an electron for “knowing” about the position of another electron with the same spin is calculated using the Kullback-Leibler divergence (D{sub KL}) between the same-spin conditional pair probability density and the marginal probability. D{sub KL} is proposed as an electron localization measurement, based on the observation that regions of the space with high information gain can be associated with strong correlated localized electrons. Taking into consideration the scaling of D{sub KL} with the number of σ-spin electrons of a system (N{sup σ}), the quantity χ = (N{sup σ} − 1) D{sub KL}f{sub cut} is introduced as a general descriptor that allows the quantification of the electron localization in the space. f{sub cut} is defined such that it goes smoothly to zero for negligible densities. χ is computed for a selection of atomic and molecular systems in order to test its capability to determine the region in space where electrons are localized. As a general conclusion, χ is able to explain the electron structure of molecules on the basis of chemical grounds with a high degree of success and to produce a clear differentiation of the localization of electrons that can be traced to the fluctuation in the average number of electrons in these regions.

Ultrafast laser pulses have been used to manipulate complex quantum materials and to induce dynamical phase transitions. One of the most striking examples is the transient enhancement of superconductivity in several classes of materials upon irradiating them with high intensity pulses of terahertz light. Motivated by these experiments we analyze the Cooper pairing instabilities in non-equilibrium electron-phonon systems. We demonstrate that the light induced non-equilibrium state of phonons results in a simultaneous increase of the superconducting coupling constant and the electron scattering. We analyze the competition between these effects and show that in a broad range of parameters the dynamic enhancement of Cooper pair formation dominates over the increase in the scattering rate. This opens the possibility of transient light induced superconductivity at temperatures that are considerably higher than the equilibrium transition temperatures. Our results pave new pathways for engineering high-temperature light-induced superconducting states.

Results on the cross section for the production of electronpairs in anti pp collisions at √s=630 GeV are presented. The measured value is σ=405±51 (syst.)±84(syst.) pb, in the variant mass interval 10 s 2 ) QCD contributions. The comparison of these data with those of lower energy experiments show approximate scaling as a function of the variable √τ=m/√s. (orig.)

A successful elucidation of the near-ultraviolet electronic circular dichroism spectrum of a short double-stranded DNA is reported. Time-dependent density functional theory methods are shown to accurately predict spectra and assign bands on the microscopic base-pair scale, a finding that opens...... the field for using circular dichroism spectroscopy as a sensitive nanoscale probe of DNA to reveal its complex interactions with the environment. (Chemical Equation Presented)....

Full Text Available The article presents the issues related to the different methods to increase the reliability of electronicsecurity systems (ESS for example, a fire alarm system (SSP. Reliability of the SSP in the descriptive sense is a property preservation capacity to implement the preset function (e.g. protection: fire airport, the port, logistics base, etc., at a certain time and under certain conditions, e.g. Environmental, despite the possible non-compliance by a specific subset of elements this system. Analyzing the available literature on the ESS-SSP is not available studies on methods to increase the reliability (several works similar topics but moving with respect to the burglary and robbery (Intrusion. Based on the analysis of the set of all paths in the system suitability of the SSP for the scenario mentioned elements fire events (device critical because of security.

Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall cost.

The mechanism of high-temperature superconductivity in the relatively novel iron-based high-Tc superconductors is unresolved, both in terms of how the phases evolve with doping, and in terms of the actual Cooper pairing process. To explore these issues, we used spectroscopic-imaging scanning tunneling microscopy to study the electronic structure of CaFe2As2 in the antiferromagnetic-orthorhombic `parent' state from which the superconductivity emerges. We discovered and visualized the now widely studied electronic `nematicity' of this phase, whose suppression is associated with the emergence of superconductivity (Science 327, 181, 2010). As subsequent transport experiments discovered a related anisotropic conductance which increases with dopant concentration, the interplay between the electronic structure surrounding each dopant atom, quasiparticle scattering therefrom, and the transport nematicity has become a pivotal focus of research. We find that substituting Co for Fe atoms in underdoped Ca(Fe1-xCox)2As2 generates a dense population of identical and strongly anisotropic impurity states that are distributed randomly but aligned with the antiferromagnetic a-axis. We also demonstrate, by imaging their surrounding interference patterns, that these impurity states scatter quasiparticles and thus influence transport in a highly anisotropic manner (M.P. Allan et al., 2013). Next, we studied the momentum dependence of the energy gaps of iron-based superconductivity, now focusing on LiFeAs. If strong electron-electron interactions mediate the Cooper pairing, then momentum-space anisotropic superconducting energy gaps Δi (k) were predicted by multiple techniques to appear on the different electronic bands i. We introduced intraband Bogoliubov quasiparticle scattering interference (QPI) techniques for the determination of anisotropic energy gaps to test these hypotheses and discovered the anisotropy, magnitude, and relative orientations of the energy gaps on multiple

Monte Carlo method is applied to the study of relaxation of excited electron-hole (e-h) pairs in graphene. The presence of background of spin-polarized electrons, with high density imposing degeneracy conditions, is assumed. To such system, a number of e-h pairs with spin polarization parallel or antiparallel to the background is injected. Two stages of relaxation: thermalization and cooling are clearly distinguished when average particles energy and its standard deviation σ _E are examined. At the very beginning of thermalization phase, holes loose energy to electrons, and after this process is substantially completed, particle distributions reorganize to take a Fermi-Dirac shape. To describe the evolution of and σ _E during thermalization, we define characteristic times τ _ {th} and values at the end of thermalization E_ {th} and σ _ {th}. The dependence of these parameters on various conditions, such as temperature and background density, is presented. It is shown that among the considered parameters, only the standard deviation of electrons energy allows to distinguish between different cases of relative spin polarizations of background and excited electrons.

Resonant ion pair formation from collisions of electrons with ground state diatomic molecular ions has been observed and absolute cross sections measured. The cross section for HD + is characterized by an abrupt threshold at 1.9thinspthinspeV and 14 resolved peaks in the range of energies 0≤E≤14 eV . The dominant mechanism responsible for the structures appears to be resonant capture and stabilization, modified by two-channel quantum interference. Data on HF + show structure correlated with photoionization of HF and with dissociative recombination of electrons with this ion. copyright 1999 The American Physical Society

Band-structure pictures for layered high-T c materials available in the literature show that, besides the dispersive broad band responsible for metallic properties, there are at least two additional bands having minima and maxima near the Fermi surface. These additional bands belong to different planes (for example, CuO planes and BiO planes in Bi 2 Sr 2 CaCu 2 O 8 ) or to planes and chains (in YBa 2 Cu 3 O 7 ). Provided the Coulomb repulsion is not very weak, pairing of electrons and holes belonging to these additional bands in different planes or planes and chains is possible. It is shown that, if this possibility is realized, a transition in the additional bands into a state of an excitonic dielectric occurs. The spin of an electron-hole pair can be both 0 and 1. Due to the fact that the electron and the hole of the pair belong to different planes, there are no charge- or spin-density waves. This excitonic insulator can serve as a polarizing substance and give a strong attraction between electrons of the metallic band even if the bare interaction is repulsive. It is also shown that some interesting gapless excitations exist. Provided there are impurities in the system that scatter from plane to plane, these excitations are coupled to the electrons of the metallic band. This effective interaction can be described in terms of an effective mode P(ω) with ImP(ω)∼-sgnω. As a result, one can obtain such properties of the normal state as a linear dependence of the resistivity on temperature, linear dependence of the density of states on energy, constant background in the Raman-scattering intensity, large nuclear relaxation rate, etc., which are very well known from experiments

The formation of Correlated ElectronPairs Oscillating around the Fermi level in Resonant Quantum States (CEPO-RQS), when a metal is cooled to its critical temperature T=Tc, is studied. The necessary conditions for the existence of CEPO-RQS are analyzed. The participation of electron-electron interaction screened by an electron dielectric constant of the form proposed by Thomas Fermi is considered and a physical meaning for the electron-phonon-electron interaction in the formation of the CEPO...

centuries old business practices in the investment industry. This study focuses on CREST, a leading settlement infrastructure that facilitated the leap from paper-based to electronic post-trading in London. In 1993 it started as a project of the Bank of England, and today, CREST is operated by Euroclear......Over recent decades, securities post-trading has seen a radical change from paper-based to electronic procedures. Technological advances have facilitated digitisation as a global trend. While in the investment industry technology has also been a key driver for financial automation since the late...... United Kingdom & Ireland (EUI). Research objectives of this study are to investigate the industry context, how the CREST project was managed and introduced at a time of crisis, how the technology was designed, and its impact on financial markets and today’s UK and European infrastructure. Twenty...

Rashba spin-orbit effects and electron correlations in the two-dimensional cylindrical lattices of square geometries are assessed using mesoscopic two-, three- and four-leg ladder structures. Here the electron transport properties are systematically calculated by including the spin-orbit coupling in tight binding and Hubbard models threaded by a magnetic flux. These results highlight important aspects of possible symmetry breaking mechanisms in square ladder geometries driven by the combined effect of a magnetic gauge field spin-orbit interaction and temperature. The observed persistent current, spin and charge polarizations in the presence of spin-orbit coupling are driven by separation of electron and hole charges and opposite spins in real-space. The modeled spin-flip processes on the pairing mechanism induced by the spin-orbit coupling in assembled nanostructures (as arrays of clusters) engineered in various two-dimensional multi-leg structures provide an ideal playground for understanding spatial charge and spin density inhomogeneities leading to electronpairing and spontaneous phase separation instabilities in unconventional superconductors. Such studies also fall under the scope of current challenging problems in superconductivity and magnetism, topological insulators and spin dependent transport associated with numerous interfaces and heterostructures.

Full Text Available Rashba spin-orbit effects and electron correlations in the two-dimensional cylindrical lattices of square geometries are assessed using mesoscopic two-, three- and four-leg ladder structures. Here the electron transport properties are systematically calculated by including the spin-orbit coupling in tight binding and Hubbard models threaded by a magnetic flux. These results highlight important aspects of possible symmetry breaking mechanisms in square ladder geometries driven by the combined effect of a magnetic gauge field spin-orbit interaction and temperature. The observed persistent current, spin and charge polarizations in the presence of spin-orbit coupling are driven by separation of electron and hole charges and opposite spins in real-space. The modeled spin-flip processes on the pairing mechanism induced by the spin-orbit coupling in assembled nanostructures (as arrays of clusters engineered in various two-dimensional multi-leg structures provide an ideal playground for understanding spatial charge and spin density inhomogeneities leading to electronpairing and spontaneous phase separation instabilities in unconventional superconductors. Such studies also fall under the scope of current challenging problems in superconductivity and magnetism, topological insulators and spin dependent transport associated with numerous interfaces and heterostructures.

The Polish-German project QUEST aims at studying relativistic quantum spin correlations of the Einstein-Rosen-Podolsky-Bohm type, through measurement of the correlation function and the corresponding probabilities for relativistic electronpairs. The results will be compared to theoretical predictions obtained by us within the framework of relativistic quantum mechanics, based on assumptions regarding the form of the relativistic spin operator. Agreement or divergence will be interpreted in the context of non-uniqueness of the relativistic spin operator in quantum mechanics as well as dependence of the correlation function on the choice of observables representing the spin. Pairs of correlated electrons will originate from the Mo/ller scattering of polarized 15 MeV electrons provided by the superconducting Darmstadt electron linear accelerator S-DALINAC, TU Darmstadt, incident on a Be target. Spin projections will be determined using the Mott polarimetry technique. Measurements (starting 2013) are planned for longitudinal and transverse beam polarizations and different orientations of the beam polarization vector w.r.t. the Mo/ller scattering plane. This is the first project to study relativistic spin correlations for particles with mass

In this thesis we study multi-photon e{sup +}e{sup -} pair production in a trident process, and singlephoton e{sup +}e{sup -} pair annihilation in a triple interaction. The pair production is considered in the collision of a relativistic electron with a strong laser beam, and calculated within the theory of laser-dressed quantum electrodynamics. A regularization method is developed systematically for the resonance problem arising in the multi-photon process. Total production rates, positron spectra, and relative contributions of different reaction channels are obtained in various interaction regimes. Our calculation shows good agreement with existing experimental data from SLAC, and adds further insights into the experimental findings. Besides, we study the process in a manifestly nonperturbative domain, whose accessibility to future all-optical experiments based on laser acceleration is shown. In the single-photon e{sup +}e{sup -} pair annihilation, the recoil momentum is absorbed by a spectator particle. Various kinematic configurations of the three incoming particles are examined. Under certain conditions, the emitted photon exhibits distinct angular and polarization distributions which could facilitate the detection of the process. Considering an equilibrium relativistic e{sup +}e{sup -} plasma, it is found that the single-photon process becomes the dominant annihilation channel for plasma temperatures above 3 MeV. Multi-particle correlation effects are therefore essential for the e{sup +}e{sup -} dynamics at very high density. (orig.)

Problem is considered of spontaneous creation of electron-positron pairs from the vacuum induced by external electric field, that is homogeneous and depends on time in an arbitrary way. The Heisenberg equations of motion are obtained for the creation-annihilation operators. The solution is a linear canonical transformation. The problem is reduced to a set of differential equations for the second-order matrices determining this transformation. A consequence of the CP symmetry of the Dirac equation with an external electric field is that the e + e - pair is created from the vacuum in a state with total spin 1. The case when the variating electric field conserves its direction, is considered in more detail. In this case the equations are much simplified and may be reduced to the Riccati equation or to problem of oscillator with variable frequency, so the problem is equivalent to the one-dimensional quantal problem of a barrier penetration. Two approximate methods to calculate the pair creation probabilities are discussed: the quasiclassical approach and the antidiabatical method, applicable for sharp variations of the external field. Numerical estimates are obtained for the number of e + e - pairs produced by the field E(t) = E cos ωt. Group-theoretical aspects of the problem are also considered. (author)

A new algorithm for implementing the adaptive Monte Carlo method is given. It is used to solve the Boltzmann equations that describe the time evolution of a nonequilibrium electron-positron pair plasma containing high-energy photons. These are coupled nonlinear integro-differential equations. The collision kernels for the photons as well as pairs are evaluated for Compton scattering, pair annihilation and creation, bremsstrahlung, and Coulomb collisions. They are given as multidimensional integrals which are valid for all energies. For an homogeneous and isotropic plasma with no particle escape, the equilibrium solution is expressed analytically in terms of the initial conditions. For two specific cases, for which the photon and the pair spectra are initially constant or have a power-law distribution within the given limits, the time evolution of the plasma is analyzed using the new method. The final spectra are found to be in a good agreement with the analytical solutions. The new algorithm is faster than the Monte Carlo scheme based on uniform sampling and more flexible than the numerical methods used in the past, which do not involve Monte Carlo sampling. It is also found to be very stable. Some astrophysical applications of this technique are discussed. copyright 1997 The American Astronomical Society

In this thesis we study multi-photon e + e - pair production in a trident process, and singlephoton e + e - pair annihilation in a triple interaction. The pair production is considered in the collision of a relativistic electron with a strong laser beam, and calculated within the theory of laser-dressed quantum electrodynamics. A regularization method is developed systematically for the resonance problem arising in the multi-photon process. Total production rates, positron spectra, and relative contributions of different reaction channels are obtained in various interaction regimes. Our calculation shows good agreement with existing experimental data from SLAC, and adds further insights into the experimental findings. Besides, we study the process in a manifestly nonperturbative domain, whose accessibility to future all-optical experiments based on laser acceleration is shown. In the single-photon e + e - pair annihilation, the recoil momentum is absorbed by a spectator particle. Various kinematic configurations of the three incoming particles are examined. Under certain conditions, the emitted photon exhibits distinct angular and polarization distributions which could facilitate the detection of the process. Considering an equilibrium relativistic e + e - plasma, it is found that the single-photon process becomes the dominant annihilation channel for plasma temperatures above 3 MeV. Multi-particle correlation effects are therefore essential for the e + e - dynamics at very high density. (orig.)

This thesis contains the first experimental results on electron-pair production from the CERES/NA45 experiment at the CERN SPS after the upgrade with a Time Projection Chamber (TPC). The data were taken in late 1999 with a Pb-beam on a Au-target at a beam energy of 40 AGeV. Out of about 8 Million events with a 30$$ centrality selection, 249$pm$28 $e^{+}e^{-}$ pairs for masses $le$0.2 GeV/c$^{2}$ with a S/B ratio of 1/1, and 185$pm$48 $e^{+}e^{-}$ pairs for masses $>$0.2 GeV/c$^{2}$ with a S/B ratio of 1/6 were reconstructed. The low-mass sample agrees with the expectation from hadronic decays. The high-mass sample shows an excess of a factor of 5.1$pm$1.3(stat)$pm$1.0(syst) above that expectation, considerably more than the values around 2.5-3.5 observed before at the higher beam energy of 160 AGeV. The excess yield is dominantly associated with pair transverse momenta $

The NA45/CERES experiment investigates primarily the production of electron-positron pairs and of direct photons in proton-nucleus and nucleus-nucleus collisions. For electron-positron pairs the experiment studies the continuum in the mass region of about 0.05 to 2 GeV/c$^2$ and the vector mesons $\\varrho ,~ \\omega$, and, $\\phi$. Since for electromagnetic probes final state interactions are practically negligible these observables are unique for studying the evolution and dynamics of ultrarelativistic heavy-ion collisions from the hot and dense early stage where a quark-gluon plasma is expected to be formed to the final freeze-out stage when hadrons decouple.\\\\ \\\\ The experiment also studies the spectral distributions of charged particles, their distribution relative to the reaction plane, and identified high momentum pions. Another topic of investigation are QED pairs produced in peripheral nuclear collisions.\\\\ \\\\ The first phase of the experiment, NA45, has been concluded with two main results: i) There is...

Pair ion plasma with a fraction of non-thermal electrons is considered. We investigate the effects of the streaming motion of ions on linear and nonlinear properties of unmagnetized, collisionless plasma by using the fluid model. A dispersion relation is derived, and the growth rate of streaming instabilities with effect of streaming motion of ions and non-thermal electrons is calculated. A qausi-potential approach is adopted to study the characteristics of ion acoustic solitons. An energy integral equation involving Sagdeev potential is derived during this process. The presence of the streaming term in the energy integral equation affects the structure of the solitary waves significantly along with non-thermal electrons. Possible application of the work to the space and laboratory plasmas are highlighted.

Pair ion plasma with a fraction of non-thermal electrons is considered. We investigate the effects of the streaming motion of ions on linear and nonlinear properties of unmagnetized, collisionless plasma by using the fluid model. A dispersion relation is derived, and the growth rate of streaming instabilities with effect of streaming motion of ions and non-thermal electrons is calculated. A quasi-potential approach is adopted to study the characteristics of ion acoustic solitons. An energy integral equation involving Sagdeev potential is derived during this process. The presence of the streaming term in the energy integral equation affects the structure of the solitary waves significantly along with non-thermal electrons. Possible application of the work to the space and laboratory plasmas are highlighted. (author)

Protonation of DNA basepairs is a reversible phenomenon that can be controlled by tuning the pH of the system. Under mild acidic conditions, the hydrogen-bonding pattern of the DNA basepairs undergoes a change. We study the effect of protonation on the electronic properties of the DNA basepairs to probe for possible molecular electronics applications. We find that, under mild acidic pH conditions, the A:T basepair shows excellent rectification behavior that is, however, absent in the G:C basepair. The mechanism of rectification has been discussed using a simple chemical potential model. We also consider the noncanonical A:A basepair and find that it can be used as efficient pH dependent molecular switch. The switching action in the A:A basepair is explained in the light of pi-pi interactions, which lead to efficient delocalization over the entire basepair.

Nonlinear structure formation in ion-temperature-gradient (ITG) driven waves is investigated in pair-ion plasma comprising ions and nonthermal electrons (kappa, Cairns). By using the transport equations of the Braginskii model, a new set of nonlinear equations are derived. A linear dispersion relation is obtained and discussed analytically as well as numerically. It is shown that the nonthermal population of electrons affects both the linear and nonlinear characteristics of the ITG mode in pair-ion plasma. This work will be useful in tokamaks and stellarators where non-Maxwellian population of electrons may exist due to resonant frequency heating, electron cyclotron heating, runaway electrons, etc.

The present account of the effects of soft photons from external sources on two-temperature accretion disks in electron-positron pair equilibrium solves the energy-balance equation for a given radial distribution of the input rate of soft photons, taking into account their bremsstrahlung and Comptonization. Critical rate behavior is investigated as a function of the ratio of the energy flux of incident soft photons and the energy-generation rate. As in a previous study, the existence of a critical accretion rate is established.

The Coulomb corrections (CC) to the processes of bremsstrahlung and pair production are investigated. The next-to-leading term in the high-energy asymptotics is found. This term becomes very essential in the region of intermediate energies. The influence of screening for CC is small for differential cross section, spectrum, and the total cross section of pair production. The same is true for the spectrum of bremsstrahlung, but not for the differential cross section, where the influence of screening can be very large. The corresponding screening corrections as well as the modification of the differential cross section of bremsstrahlung are found. A comparison of our results for the total cross section of pair production with the experimental data available is performed. This comparison has justified our analytical results and allowed to elaborate a simple ansatz for the next-to-leading correction. The influence of the electron beam shape on CC for bremsstrahlung is investigated. It turns out that the differential cross section is very sensitive to this shape

Among observables that have been proposed as signals of quark gluon plasma the lepton pairs from decays of vector bosons r, w, j, J/Y, U,... play important role. Effects such as the J/Y suppression, chiral symmetry restoration, strangeness enhancement and fast "clock" for the fireball lifetime are associated with possibilities of the lepton-pair spectroscopy in PbPb collisions at the LHC energies. In PbPb collisions the high particle density in central rapidity region is expected and therefore one has first of all to verify the feasibility of experiments aimed to measurement of cross sections, width and positions of vector resonances. For this purpose the programme LHCWPT has been developed which simulates production and two-and three-body decays of the Â¹Â¡, hÂ°, h, r, w, f, J/Y, U and Drell-Yan pairs in central rapidity region and also a detection of electrons and positrons in HEAVY ION DEDICATED EXPERIMENT.

Resonant ion-pair formation from collisions of electrons with electronic and vibronic ground-state diatomic molecular ions has been studied in the present work for HD + and OH + . The cross section for HD + has a magnitude of the order of 3x10 -19 cm 2 and is characterized by an energy threshold and 14 resolved peaks in the energy range up to 16 eV. A theoretical study confirms that the structures derive primarily from quantum interference of the multiple dissociation pathways. Measurements for OH + reveal that the cross section for H + and O - formation is lower than 10 -21 cm 2 at energies of 6 and 12 eV. (c) 2000 The American Physical Society

The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.

Electroweak measurements performed with data taken at the electron-positron collider LEP at CERN from 1995 to 2000 are reported. The combined data set considered in this report corresponds to a total luminosity of about 3~fb$^{-1}$ collected by the four LEP experiments ALEPH, DELPHI, L3 and OPAL, at centre-of-mass energies ranging from $130~GeV$ to $209~GeV$. Combining the published results of the four LEP experiments, the measurements include total and differential cross-sections in photon-pair, fermion-pair and four-fermion production, the latter resulting from both double-resonant WW and ZZ production as well as singly resonant production. Total and differential cross-sections are measured precisely, providing a stringent test of the Standard Model at centre-of-mass energies never explored before in electron-positron collisions. Final-state interaction effects in four-fermion production, such as those arising from colour reconnection and Bose-Einstein correlations between the two W decay systems arising ...

We have discovered a novel feature in the plasmon excitations for a pair of Coulomb-coupled non-concentric spherical two-dimensional electron gases (S2DEGs). Our results show that the plasmon excitations for such pairs depend on the orientation with respect to the external electromagnetic probe field. The origin of this anisotropy of the inter-sphere Coulomb interaction is due to the directional asymmetry of the electrostatic coupling of electrons in excited states which depend on both the angular momentum quantum number L and its projection M on the axis of quantization taken as the probe E-field direction. We demonstrate the anisotropic inter-sphere Coulomb coupling in space and present semi-analytic results in the random-phase approximation both perpendicular and parallel to the axis of quantization. For the incidence of light with a finite orbital or spin angular momentum, the magnetic field generated from an induced oscillating electric dipole on one sphere can couple to an induced magnetic dipole on another sphere in a way that is dependent on whether the direction is parallel or perpendicular to the probe E field. Such an effect from the plasmon spatial correlation is expected to be experimentally observable by employing circularly polarized light or a helical light beam for incidence. The S2DEG serves as a simple model for fullerenes as well as metallic dimers, when the energy bands are far apart. (paper)

The electron-pair function h(u) of a finite many-electron system is not monotonic, but the related quantity h(u)/u α , α>0, is not only monotonically decreasing from the origin but also convex for the values α 1 and α 2 , respectively, as has been recently found. Here, it is first argued that this quantity is also logarithmically convex for any α≥α' with α'=max{-u 2 d2[lnh(u)]/du 2 }. Then this property is used to obtain a general inequality which involves three interelectronic moments left-angle u t right-angle. Particular cases of this inequality involve relevant characteristics of the system such as the number of electrons and the total electron-electron repulsion energy. Second, the logarithmic-convexity property of h(u) as well as the accuracy of this inequality are investigated by the optimum 20-term Hylleraas-type wave functions for two-electron atoms with nuclear charge Z=1, 2, 3, 5, and 10. It is found that (i) 14 2 much-gt α 1 ) and (ii) the accuracy of the inequality which involves moments of contiguous orders oscillates between 62.4% and 96.7% according to the specific He-like atom and the moments involved. Finally, the importance of the logarithmic-convexity effects on the interelectronic moments relative to those coming from other monotonicity properties of h(u)/u α are analyzed in the same numerical Hylleraas framework

... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

The two only species of isolatable, smallest, or unit charges +e and −e present in nature interact with the universal vacuum in a polarisable dielectric representation through two uniquely defined vacuum potential functions. All of the non-composite subatomic particles containing one-unit charges, +e or −e, are therefore formed in terms of the IED model of the respective charges, of zero rest masses, oscillating in either of the two unique vacuum potential fields, together with the radiation waves of their own charges. In this paper we give a first principles treatment of the dynamics of charge in a dielectric vacuum, based on which, combined with solutions for the radiation waves obtained previously, we subsequently derive the vacuum potential function for a given charge q, which we show to be quadratic and consist each of quantised potential levels, giving therefore rise to quantised characteristic oscillation frequencies of the charge and accordingly quantised, sharply-defined masses of the IED particles. By further combining with relevant experimental properties as input information, we determine the IED particles built from the charges +e, −e at their first excited states in the respective vacuum potential wells to be the proton and the electron, the observationally two only stable (permanently lived) and 'free' particles containing one-unit charges. Their antiparticles as produced in pair productions can be accordingly determined. The characteristics of all of the other more energetic single-charged non-composite subatomic particles can also be recognised. We finally discuss the energy condition for pair production, which requires two successive energy supplies to (1) first disintegrate the bound pair of vaculeon charges +e, −e composing a vacuuon of the vacuum and (2) impart masses to the disintegrated charges.

Direct electron pain production via virtual photons by moving charged particles is a unique electro-magnetic process having a substantial dependence on energy. Most electro-magnetic processes, including transition radiation, cease to be sensitive to the incident energy above 10 TeV/AMU. Thus, it is expected, that upon establishment of cross section and detection efficiency of this process, it may provide a new energy measuring technique above 10 TeV/AMU. Three accelerator exposures of emulsion chambers designed for measurements of direct electron-pains were performed. The objectives of the investigation were to provide the fundamental cross-section data in emulsion stacks to find the best-fit theoretical model, and to provide a calibration of measurements of direct electron-pairs in emulsion chamber configurations. This paper reports the design of the emulsion chambers, accelerator experiments, microscope measurements, and related considerations for future improvements of the measurements, and for possible applications to high energy cosmic ray experiments. Also discussed are the results from scanning 56m of emulsion tracks at 1200x magnification so that scanning efficiency is optimized. Measurements of the delta-ray range spectrum were also performed for much shorter track lengths, but with sufficiently large statistics in the number of measured delta-rays.

This experiment involves a modification of the apparatus used in R108, which extends the region of photon and electron detection to the entire azimuth, complementing the full azimuth charged particle detection already available. A five-fold increase in the acceptance for high mass e|+e|- pairs is thus achieved; the study of jets is also improved by extending the region of @g and @p|0 detection. An active converter consisting of lead glass and followed by a cathode strip read out MWPC is placed in front of each of the R108 lead glass arrays to improve @g/@p|0 discrimination. The modified apparatus is shown in the Figure. The specific physics aims of the experiment are: \\item 1) Search for high mass states decaying into e|+e|-. In a 3000-hour run the sensitivity is 2\\% of the @U cross-section for 10 detected events. \\item 2) Study of e|+e|- pair production above the @U mass. As well as the cross-section, the transverse momentum and rapidity distributions will be measured, providing a crucial test of QCD as appl...

This is a continuation of the NA45 experiment dedicated to the measurement of electron-positron pairs and direct photons produced in Pb-Pb collisions at SPS energies. The main goal remains as outlined in NA45. The strong enhancement of low-mass pairs, over the expected yield from hadronic sources, observed in S-Au collisions by NA45, adds considerably to the physics potential and to the interest in the measurement of these variables. \\\\\\\\The figure shows the layout of the CERES spectrometer which has been upgraded to cope with the higher multiplicities and background of central Pb-Pb collisions. The basic spectrometer remains unchanged, namely two Ring Imaging Cherenkov detectors (RICH), one situated before the other after a short superconducting double solenoid. The main elements of the upgrade are additional detectors, two silicon radial-drift chambers (instead of one in the original set-up) and a pad chamber (a large MWPC with pad readout) located behind the spectrometer. They allow real tracking and help...

Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

Electronic payment is the way to make in the process of buying and selling customers in real estate market or online market easier. Electronic payments give innovation to consumer with transaction overseas like online shopping. This study aims to determine the influence of trust and security in the use of electronic payment system. Where the independent variables are trust and security influence in using electronic payment system as the dependent variable. This research used quantitative meth...

The electron-hole pairing, which is possible in metals or semiconductors, can give condensed phases with two order parameters. If the coupling between the two order parameters is considered, the free energy functional is similar with the free energy of a n-component spin system with cubic anisotropy. Using the Wagner hypothesis (tricritical scaling) the non-linear scaling fields have been calculated. In order to perform the calculation of the nonlinear fields we used the method given by Rudnick and Nelson to solve the recursion relations for the 4-epsilon-dimensional system with n=6 components. The present calculation in the frame-work of the renormalization-group approach confirms the result obtained in the mean-field theory that the coupling of the two order parameters induces a first order phase transition. (author)

Valence-shell electron-pair repulsion (VSEPR) theory is conventionally used to predict molecular geometry. However, it is difficult to explore the full implications of this theory by simply drawing chemical structures. Here, we introduce origami modelling as a more accessible approach for exploration of the VSEPR theory. Our technique is simple, readily accessible and inexpensive compared with other sophisticated methods such as computer simulation or commercial three-dimensional modelling kits. This method can be implemented in chemistry education at both the high school and university levels. We discuss the example of a simple molecular structure prediction for ammonia (NH 3 ). Using the origami model, both molecular shape and the scientific justification can be visualized easily. This ‘hands-on’ approach to building molecules will help promote understanding of VSEPR theory. (paper)

Valence-shell electron-pair repulsion (VSEPR) theory is conventionally used to predict molecular geometry. However, it is difficult to explore the full implications of this theory by simply drawing chemical structures. Here, we introduce origami modelling as a more accessible approach for exploration of the VSEPR theory. Our technique is simple, readily accessible and inexpensive compared with other sophisticated methods such as computer simulation or commercial three-dimensional modelling kits. This method can be implemented in chemistry education at both the high school and university levels. We discuss the example of a simple molecular structure prediction for ammonia (NH3). Using the origami model, both molecular shape and the scientific justification can be visualized easily. This ‘hands-on’ approach to building molecules will help promote understanding of VSEPR theory.

There has been long-standing debate on how free charges are generated in donor:acceptor blends that are used in organic solar cells, and which are generally comprised of a complex phase morphology, where intermixed and neat phases of the donor and acceptor material co-exist. Here we resolve this question, basing our conclusions on Stark effect spectroscopy data obtained in the absence and presence of externally applied electric fields. Reconciling opposing views found in literature, we unambiguously demonstrate that the fate of photogenerated electron-hole pairs--whether they will dissociate to free charges or geminately recombine--is determined at ultrafast times, despite the fact that their actual spatial separation can be much slower. Our insights are important to further develop rational approaches towards material design and processing of organic solar cells, assisting to realize their purported promise as lead-free, third-generation energy technology that can reach efficiencies over 10%.

It is generally accepted that electron transfer in bacterial photosynthesis is driven by the first singlet excited state of a special pair of bacteriochlorophylls (P*). We have examined the first steps of electron transfer in a mutant of the Rhodobacter sphaeroides reaction center in which charge

It is generally accepted that electron transfer in bacterial photosynthesis is driven by the first singlet excited state of a special pair of bacteriochlorophylls (P*). We have examined the first steps of electron transfer in a mutant of the Rhodobacter sphaeroides reaction center in which charge

scales. What has become clear in the last ten years is that all the three above mentioned processes, duly extended in the general relativistic framework, are necessary for the understanding of the physics of the gravitational collapse to a black hole. Vice versa, the natural arena where these processes can be observed in mutual interaction and on an unprecedented scale, is indeed the realm of relativistic astrophysics. We systematically analyze the conceptual developments which have followed the basic work of Dirac and Breit-Wheeler. We also recall how the seminal work of Born and Infeld inspired the work by Sauter, Heisenberg and Euler on effective Lagrangian leading to the estimate of the rate for the process of electron-positron production in a constant electric field. In addition to reviewing the intuitive semi-classical treatment of quantum mechanical tunneling for describing the process of electron-positron production, we recall the calculations in Quantum Electro-Dynamics of the Schwinger rate and effective Lagrangian for constant electromagnetic fields. We also review the electron-positron production in both time-alternating electromagnetic fields, studied by Brezin, Itzykson, Popov, Nikishov and Narozhny, and the corresponding processes relevant for pair production at the focus of coherent laser beams as well as electron-beam-laser collision. We finally report some current developments based on the general JWKB approach which allows us to compute the Schwinger rate in spatially varying and time varying electromagnetic fields. We also recall the pioneering work of Landau and Lifshitz, and Racah on the collision of charged particles as well as the experimental success of AdA and ADONE in the production of electron-positron pairs. We then turn to the possible experimental verification of these phenomena. We review: (A) the experimental verification of the e+e-→2γ process studied by Dirac. We also briefly recall the very successful experiments of e

Healthcare is a huge market--20% of yearly GDP in the U.S. It employs tens of thousands of computer programmers and IT administrators Regulations mandate electronic health records by 2015 (for anyone dealing with Medicare/Medicaid), which means new concerns for privacy and security Many medical organizations lagging, putting them at risk for government fines and private lawsuits when a breach in security occurs. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge.

Among the aims of the PHENIX experiment are the identification and measurement of the properties of the ρ, ω, φ and J/ψ vector mesons that have decayed through the e + e - channel. The main obstacle to identifying vector mesons (VM) using the e + e - invariant mass, is the significant number of e + and e - from other sources, which causes a large combinatorical background in the invariant mass spectrum. The work we have done aims to reduce this background by identifying background sources through kinematical cuts and removing them along with their combinatorical effects, while at the same time preserving as much as possible of the signal, i.e. the electrons from VM decay. A measurement of electronpairs (e + and e - ) from π-π and q bar q thermal sources is also a possibility, and a clear identification of the ''easier'' vector mesons (ω, φ) will be an indication of how well the thermal measurement can be done. To determine the nature and values of the kinematical cuts we have used a computer simulation to generate particles according to predetermined phase-space (rapidity and P T ) and multiplicity distributions

We unravel theoretically a key intrinsic relaxation mechanism among the low-lying singlet and triplet donor-pair states in silicon, an important element in the fast-developing field of spintronics and quantum computation. Despite the perceived weak spin-orbit coupling (SOC) in Si, we find that our discovered relaxation mechanism, combined with the electron-phonon and interdonor interactions, drives the transitions in the two-electron states over a large range of donor coupling regimes. The scaling of the relaxation rate with interdonor exchange interaction J goes from J5 to J4 at the low to high temperature limits. Our analytical study draws on the symmetry analysis over combined band, donor envelope, and valley configurations. It uncovers naturally the dependence on the donor-alignment direction and triplet spin orientation, and especially on the dominant SOC source from donor impurities. While a magnetic field is not necessary for this relaxation, unlike in the single-donor spin relaxation, we discuss the crossover behavior with increasing Zeeman energy in order to facilitate comparison with experiments.

The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.

The hadronic production of electronpairs with masses between 200 and 500 MeV and large transverse momentum has been measured at the CERN Intersecting Storage Rings (ISR). The expected relation between low-mass electronpairs and real photons is used to determine the direct hadronic production of photons. Contrary to indications from some previous experiments, the observed spectrum is consistent with expectations from the decay of known mesons, and leads to a value for the ratio of direct photons to π 0 of γ/π 0 =(0.55+-0.92)% for 2 = 55 GeV. (Auth.)

Thermal electron-positron pair equilibria in two temperature models of compact x ray and gamma ray sources are studied. The pairs are assumed to be heated by Coulomb interaction with the much hotter protons and cooled by bremsstrahlung emission, Compton scattering, and annihilation. Two parameters, the proton optical depth and the compactness, characterize each equilibrium state. It is shown that a careful account of the energy balance is very important when the stability properties of the pair equilibria in a spherical plasma cloud are determined. The equilibria are found to be unstable in a very limited range of compactness and proton optical depth. This particular instability is unlikely to be the cause of the observed variability of the compact sources and implies that it is possible to build up high pair densities by a thermal mechanism in two temperature environments. The most important result considers the effects of pairs on the structure of geometrically and effectively optically thin accretion disks. A new approach for solving for the equilibrium structure of the disks is presented. In effect, the pair equilibrium states are projected into the space spanned by the disk structure parameters. This allows a direct visualization of all possible disk solutions at once. Each solution profile needs to be calculated only once and a complete disk solution is obtained by a simple radial coordinate transformation. The disk solutions are thus seen to be scale free in terms of the radial coordinate as well as in terms of the mass of the central object and the accretion rate. Two particular disk solutions are given. It is shown that including electron-positron pairs in the disk structure calculations leads to a breakdown of the thin disk assumptions and that more detailed disk modeling is required before electron-positron pairs can be self-consistently included

Electronic commerce operates relying on the open Internet. Security architecture for e-commerce becomes the key point to its use prosperously. A finite automation of typical e-commerce model is presented in this paper. The finite automation simulates typical trade system, describes its states transition and supplies a theory basis for designing security architecture for e-commerce. Then security threats and corresponding solutions to the model are discussed. Finally, the security architecture for e-commerce is given. All of them are used as basis for further e-commerce security research.

Quantum evolution of particles under strong fields can be approximated by the quantum trajectories that satisfy the stationary phase condition in the Dirac-Feynmann path integrals. The quantum trajectories are the key concept to understand strong-field optics phenomena, such as high-order harmonic generation (HHG), above-threshold ionization (ATI), and high-order terahertz siedeband generation (HSG). The HSG in semiconductors may have a wealth of physics due to the possible nontrivial ``vacuum'' states of band materials. We find that in a spin-orbit-coupled semiconductor, the cyclic quantum trajectories of an electron-hole pair under a strong terahertz field accumulates nontrivial Berry phases. We study the monolayer MoS2 as a model system and find that the Berry phases are given by the Faraday rotation angles of the pulse emission from the material under short-pulse excitation. This result demonstrates an interesting Berry phase dependent effect in the extremely nonlinear optics of semiconductors. This work is supported by Hong Kong RGC/GRF 401512 and the CUHK Focused Investments Scheme.

This note presents the CMS experiment potential to discover heavy resonances decaying into an electron-positron pair, such as Kaluza-Klein excitations of a Z or graviton boson predicted in extra dimension models (the TeV^-1 model and the Randall-Sundrum model), or as neutral heavy Z' boson predicted by Grand Unified Theories. Full and fast simulation and reconstruction are used to investigate these productions, with the pileup condition corresponding to a luminosity equal to 2 times 10^ 33; mathrm cm ^ -2 mathrm s ^ -1 . For an integrated luminosity of 60 fbinv, a 5 sigma discovery limit has been obtained for a mass of 5.9 tevct in the case of Kaluza-Klein excitation Z boson production. For the Randall-Sundrum graviton production, the limit is found for graviton masses of 1.8 tevct with a coupling parameter constant c=0.01 and 4.1 tevct for c=0.1 . For the six Z' models considered here, the 5 sigma discovery limit ranges for masses from 3.6 tevct (rm Z_psi) to 4.6 tevct (rm Z_ALRM).

Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

Paired helical filaments (PHFs) accumulate in the brains of subjects affected with Alzheimer's disease (AD) and certain other neurodegenerative disorders, including corticobasal degeneration (CBD). Electron microscope studies have shown that PHFs from CBD differ from those of AD by being wider and having a longer periodicity of the helical twist. Moreover, PHFs from CBD have been shown to be primarily composed of two rather than three highly phosphorylated polypeptides of tau (PHF-tau), with these polypeptides expressing no exons 3 and 10. To further explore the relationship between the heterogeneity of PHF-tau and the appearance of abnormal filaments, the ultrastructure and physical parameters such as mass per unit length and dimensions were compared in filaments from CBD and AD using high resolution scanning transmission electron microscopy (STEM). Filament-enriched fractions were isolated as Sarcosyl-insoluble pellets and for STEM studies, samples were freeze-dried without prior fixation or staining. Ultrastructurally, PHFs from CBD were shown to be a heterogeneous population as double- and single-stranded filaments could be identified based on their width and physical mass per unit length expressed in kilodaltons (kd) per nanometer (nm). Less abundant, double-stranded filaments had a maximal width of 29 nm and a mass per unit length of 133 kd/nm, whereas three times more abundant single-stranded filaments were 15 nm wide and bad a mass per unit length of 62 kd/nm. Double-stranded filaments also displayed a distinct axial region of less dense mass, which appeared to divide the PHFs into two protofilament-like strands. Furthermore, these filaments were frequently observed to physically separate along the long axis into two single strands or to break longitudinally. In contrast, PHFs from AD were ultrastructurally stable and uniform both in their width (22 nm) and physical mass per unit length (104 kd/nm). The ultrastructural features indicate that filaments of

Angular and momentum distributions have been measured for electron-positron pairs created in peripheral collisions of 6.4 TeV bare sulfur ions with thin targets of Al, Pd, and Au. Singly- and doubly-differential cross sections are presented for 1--17 MeV/c electrons and positrons detected independently and in coincidence as pairs. Various physical parameters are deduced from the coincident electron and positron data, including probability distributions for the pair transverse momentum, the pair total energy, and the positron fraction of the pair energy

Metal oxide nanoparticle resists have attracted much attention as the next-generation resist used for the high-volume production of semiconductor devices. However, the sensitization mechanism of the metal oxide nanoparticle resists is unknown. Understanding the sensitization mechanism is important for the efficient development of resist materials. In this study, the energy deposition in a zirconium oxide (ZrO2) nanoparticle resist was investigated. The numbers of electron-hole pairs generated in a ZrO2 core and an methacrylic acid (MAA) ligand shell upon exposure to 1 mJ cm-2 (exposure dose) extreme ultraviolet (EUV) radiations were theoretically estimated to be 0.16 at most and 0.04-0.17 cm2 mJ-1, respectively. By comparing the calculated distribution of electron-hole pairs with the line-and-space patterns of the ZrO2 nanoparticle resist fabricated by an EUV exposure tool, the number of electron-hole pairs required for the solubility change of the resist films was estimated to be 1.3-2.2 per NP. NP denotes a nanoparticle consisting of a metal oxide core with a ligand shell. In the material design of metal oxide nanoparticle resists, it is important to efficiently use the electron-hole pairs generated in the metal oxide core for the chemical change of ligand molecules.

Phosphorus (P) and boron (B) co-doped Si nanocrystals (NCs) have raised interest in the optoelectronic industry due to their electronic tunability, optimal carrier multiplication properties, and straightforward dispersibility in polar solvents. Yet a basic understanding of the interaction of photoexcited electron-hole (e-h) pairs with new physical features that are introduced by the co-doping process (free carriers, defect states, and surface chemistry) is missing. Here, we present the first study of the ultrafast carrier dynamics in SiO2-embedded P-B co-doped Si NC ensembles using induced absorption spectroscopy through a two-step approach. First, the induced absorption data show that the large fraction of the dopants residing on the NC surface slows down carrier relaxation dynamics within the first 20 ps relative to intrinsic (undoped) Si NCs, which we interpret as enhanced surface passivation. On longer time-scales (picosecond to nanosecond regime), we observe a speeding up of the carrier relaxation dynamics and ascribe it to doping-induced trap states. This argument is deduced from the second part of the study, where we investigate multiexciton interactions. From a stochastic modeling approach we show that localized carriers, which are introduced by the P or B dopants, have minor electronic interactions with the photoexcited e-h pairs. This is understood in light of the strong localization of the introduced carriers on their original P- or B-dopant atoms, due to the strong quantum confinement regime in these relatively small NCs (<6 nm).

Generation of photon pairs from compact, manufacturable, and inexpensive silicon (Si) photonic devices at room temperature may help develop practical applications of quantum photonics. An important characteristic of photon-pair generation is the two-photon joint spectral intensity, which describes the frequency correlations of the photon pair. Recent attempts to generate a factorizable photon-pair state suitable for heralding have used short optical pump pulses from mode-locked lasers, which are much more expensive and bigger table-top or rack-sized instruments compared with the Si microchip used for generating photon pairs, and thus dominate the cost and inhibit the miniaturization of the source. Here, we generate photon pairs from an Si microring resonator by using an electronic step-recovery diode to drive an electro-optic modulator which carves the pump light from a continuous-wave laser diode into pulses of the appropriate width, thus potentially eliminating the need for optical mode-locked lasers.

Graphical abstract: Asymptotic biradical state produced by the excited-state coupled proton–electron transfer (CPET), resulting in charge separation (proton–electronpair creation) on a proton–electron acceptor A, in a series of photochemical systems generally denoted as X–Mn–OH{sub 2}⋯A, where X = (OH, Ca(OH){sub 3}) and A = (N-methylformamidine, guanidine, imidazole, or ammonia clusters). - Abstract: In this perspective article, we review, along with presenting new results, a series of our theoretical analyses on the excited-state mechanism of charge separation (proton–electronpair creation) relevant to the photoinduced water-splitting reaction (2H{sub 2}O → 4H{sup +} + 4e{sup −} + O{sub 2}) in organic and biological systems, which quite often includes Mn clusters in various molecular configurations. The present mechanism is conceived to be universal in the triggering process of the photoexcited water splitting dynamics. In other words, any Mn-based catalytic charge separation is quite likely to be initiated according to this mechanism. As computationally tractable yet realistic models, we examine a series of systems generally expressed as X–Mn–OH{sub 2}⋯A, where X = (OH, Ca(OH){sub 3}) and A = (N-methylformamidine, guanidine, imidazole or ammonia cluster) in terms of the theory of nonadiabatic electron wavepacket dynamics. We first find both an electron and a proton are simultaneously transferred to the acceptors through conical intersections upon photoexcitation. In this mechanism, the electron takes different pathways from that of the proton and reaches the densely lying Rydberg-like states of the acceptors in the end, thereby inducing charge separation. Therefore the presence of the Rydberg-like diffused unoccupied states as an electron acceptor is critical for this reaction to proceed. We also have found another crucial nonadiabatic process that deteriorates the efficiency of charge separation by rendering the created pair of proton

We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

We investigate the effects of laser pulse shape on strong-field quantum electrodynamics (QED) processes during the collision between a relativistic electron beam and an intense laser pulse. The interplay between high-energy photon emission and two pair production processes, i.e. nonlinear Breit–Wheeler (BW) and Trident, was investigated using particle-in-cell simulations. We found that the temporal evolution of these two processes could be controlled by using laser pulses with different degrees of asymmetry. The temporal envelope of the laser pulse can significantly affect the number of pairs coming from the Trident process, while the nonlinear BW process is less sensitive to it. This study shows that the two QED processes can be examined with state-of-the-art petawatt lasers and the discrimination of the two pair creation processes is feasible by adjusting the temporal asymmetry of the colliding laser pulse.

International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

Full Text Available With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secureelectronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.

The muonic pair production in colliding electron-positron beams is treated assuming the electron and muon weak interaction constants to be different. General formulae for the differential and total cross sections applicable at arbitrary energies of the colliding beams are obtained taking simultaneously into account arbitrary polarizations of the incident particles and longitudinal polarization of the muon (μ - ). It is shown that study of some polarization characteristics of a given reaction allows to distinguish possible weak interaction μe universality breaking effects. The revealing effects are analysed in the framework of unified gauge SU(2)xU(1) models, of weak and electromagnetic interactions [ru

Electronic structure properties of 4-n-methoxy-4′-cyanobiphenyl, a pure nematic liquid crystal have been examined using an ab‒initio, HF/6‒31G(d,p) technique with GAMESS program. Conformational and charge distribution analysis have been carried out. MEP, HOMO and LUMO surfaces have been scanned. Ionization potential, electron affinity, electronegativity, global hardness and softness of the liquid crystal molecule have been calculated. Further, stacking, side by side and end to end interactions between a molecular pair have been evaluated. Results have been used to elucidate the physico-chemical and liquid crystalline properties of the system.

QED predicts copious direct electronpair production by ultrarelativistic heavy nuclei in a high Z medium such as nuclear emulsion. First order QED calculations (combined screening and non-screening) for this process show that 1000@+32 electronpairs above 100~keV energy) should be emitted for a total |1|6O track length of 10.9~m in nuclear emulsion at 200~GeV/AMU. Emulsion exposures with oxygen (and other nuclei if available) at 60 and 200~GeV/AMU will be used to calibrate the energy dependent cross section @s~@j~(1n~E)|2|-|3, whose exponent depends on atomic screening. The oxygen tracks in the developed emulsions will be scanned with a microscope, and the number of direct electronpairs will be counted for individual tracks. The exposed stacks will contain sufficient emulsion (and CR39 plastic to check for possible interactions) that adequate path length will be available for exposures to @$>$~10|4~ions at each energy and ion species. \\\\ \\\\ If the absolute value of this cross section is confirmed as large a...

The HADES-spectrometer at GSI is used to measure the production of the light vector mesons ρ, ω and φ at SIS energies. Therefore, the medium sized collision system Ar+KCl was measured at 1.76 AGeV kinetic energy of beam particles. In this system the density of particle tracks is much larger as compared to the formerly used collision system C+C, making it necessary to upgrade the data analysis. The previous method of hard-cuts - used for particle identification - was replaced by a newly developed multi-variate analysis based on an artificial neural network. This algorithm has the benefit, that it is more robust against fluctuations in one or more of the used detector observables. This increases the overall efficiency and purity of the analysis procedure. Furthermore, the reconstruction of particle tracks inside the HADES spectrometer is based on a few position information, only. During analysis of raw data, these information are combined to a artificially large manifold of tracks. This leads to the general problem that one has to select the maximum number of true physical tracks out of this set of tracks per event. A new method of track selection is used to filter the data not only to select single tracks, but also to identify electronpairs created during Dalitz-decay of π 0 mesons, which build the bulk of combinatorial background. The result of the analysis is an efficiency corrected invariant mass spectrum of electronpairs, normalized to the mean number of pions per event. The spectrum consists of more than 16,000 pairs with an invariant mass larger than 150 MeV. In total more than 150000 pairs were found. A first comparison with the spectra calculated by using the old analysis approach shows a 30% enhancement in yield of reconstructed electronpairs. A first comparison with a simple thermal model implemented by the Pluto event generator, opens the possibility to compare the measured pair yield of ω and φ mesons via m T -scaling with the yield of η mesons

A method for the determination of electron density using a narrow beam attenuation geometry is described. The method does not require that the elemental composition of the phantom materials is known. The Hounsfield numbers for the phantom materials used were determined using five different CT scanners. A relationship between Hounsfield number and electron density can thus be established, which is of considerable value in radiation therapy treatment planning procedures. Measurements of the ratio coherent/incoherent scattering of low energy photons in a certain geometry has proven valuable for determination of atomic number, which in its turn can be used for estimation of macroscopic pair production coefficients for high energy photons. The combination of knowledge of electron density with methods for determination of processes, dependent on atomic number, can form a base for adequate composition of phantom materials for purposes of testing dose calculation algorithms for photons and electrons. (orig.)

Probing the electron density transfers during a chemical reaction can provide important insights, making possible to understand and control chemical reactions. This aim has required extensions of the relationships between the traditional chemical concepts and the quantum mechanical ones. The present work examines the detailed chemical insights that have been generated through 100 years of work worldwide on G. N. Lewis's ground breaking paper on The Atom and the Molecule (Lewis, G. N. The Atom and the Molecule, J. Am. Chem. Soc. 1916, 38, 762-785), with a focus on how the determination of reaction mechanisms can be reached applying the bonding evolution theory (BET), emphasizing how curly arrows meet electron density transfers in chemical reaction mechanisms and how the Lewis structure can be recovered. BET that combines the topological analysis of the electron localization function (ELF) and Thom's catastrophe theory (CT) provides a powerful tool providing insight into molecular mechanisms of chemical rearrangements. In agreement with physical laws and quantum theoretical insights, BET can be considered as an appropriate tool to tackle chemical reactivity with a wide range of possible applications. Likewise, the present approach retrieves the classical curly arrows used to describe the rearrangements of chemical bonds for a given reaction mechanism, providing detailed physical grounds for this type of representation. The ideas underlying the valence-shell-electronpair-repulsion (VSEPR) model applied to non-equilibrium geometries provide simple chemical explanations of density transfers. For a given geometry around a central atom, the arrangement of the electronic domain may comply or not with the VSEPR rules according with the valence shell population of the considered atom. A deformation yields arrangements which are either VSEPR defective (at least a domain is missing to match the VSEPR arrangement corresponding to the geometry of the ligands), VSEPR compliant

A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

Recently, new calculations were made of the direct Coulomb pair cross section that rely less in arbitrary parameters. More accurate calculations of the cross section down to low pair energies were made. New measurements of the total direct electronpair yield, and the energy and angular distribution of the electronpairs in emulsion were made for O-16 at 60 and 200 GeV/amu at S-32 at 200 GeV/amu which give satisfactory agreement with the new calculations. These calculations and measurements are presented along with previous accelerator measurements made of this effect during the last 40 years. The microscope scanning criteria used to identify the direct electronpairs is described. Prospects for application of the pair method to cosmic ray energy measurements in the region 10 (exp 13) to 10 (exp 15) eV/amu are discussed.

The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

We review the status of the theoretical predictions for W-pair production in e + e - collisions within the electroweak standard model (SM). We first consider for on-shell W-bosons the lowest-order cross-section within the SM, the general effects of anomalous couplings, the radiative corrections within the SM, and approximations for them. Then we discuss the inclusion of finite-width effects in lowest order and the existing results for radiative corrections to off-shell W-pair production, and we outline the general strategy to calculate radiative corrections within the pole scheme. We summarize the theoretical predictions for the total and partial W-boson widths including radiative corrections and discuss the quality of an improved Born approximation. Finally we provide a general discussion of the structure-function method to calculate large logarithmic higher-order corrections associated with collinear photon radiation. (orig.)

The nonthermal e(+/-) pair model of the central engine of active galactic nuclei (AGNs) is discussed. The model assumes that nonthermal e(+/-) pairs are accelerated to highly relativistic energies in a compact region close to the central black hole and in the vicinity of some cold matter. The model has a small number of free parameters and explains a large body of AGN observations from EUV to soft gamma-rays. In particular, the model explains the existence of the UV bump, the soft X-rays excess, the canonical hard X-ray power law, the spectral hardening above about 10 keV, and some of the variability patterns in the soft and hard X-rays. In addition, the model explains the spectral steepening above about 50 keV seen in NGC 4151.

This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

Multi-electron redox reactions, although central to artificial photosynthesis, are kinetically sluggish. Amidst the search for synthetic catalysts for such processes, plasmonic nanoparticles have been found to catalyse multi-electron reduction of CO 2 under visible light. This example motivates the need for a general, insight-driven framework for plasmonic catalysis of such multi-electron chemistry. Here, we elucidate the principles underlying the extraction of multiple redox equivalents from a plasmonic photocatalyst. We measure the kinetics of electron harvesting from a gold nanoparticle photocatalyst as a function of photon flux. Our measurements, supported by theoretical modelling, reveal a regime where two-electron transfer from the excited gold nanoparticle becomes prevalent. Multiple electron harvesting becomes possible under continuous-wave, visible-light excitation of moderate intensity due to strong interband transitions in gold and electron-hole separation accomplished using a hole scavenger. These insights will help expand the utility of plasmonic photocatalysis beyond CO 2 reduction to other challenging multi-electron, multi-proton transformations such as N 2 fixation.

Electrons and holes in a semiconductor form hydrogen-atom-like bound states, called excitons. At high electron-hole densities the attractive Coulomb force becomes screened and excitons can no longer exist. Bardeen-Cooper-Schrieffer theory predicts that at such high densities co-operative many-body

The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing

Using multireference configuration interaction (MRCI) calculations with single and double excitation levels, Davidson correction, and a spin-orbit (SO) effective core potential, we have developed a series of four low-lying electronic potential energy curves (PECs) for the pairs formed between a cesium atom (Cs) and a rare gas (Rg = He, Ne, Ar, Kr, and Xe). The results obtained at the MRCI level were compared with those generated at the SOCI level, which were recently reported by Blank et al. The shapes of the PECs were essentially the same when the same basis set was used. Based on this agreement, more precise PECs for Cs-Rg pairs were calculated using a larger basis set for Rg. (author)

We set up a formalism, within the antenna subtraction framework, for computing the production of a massive quark-antiquark pair in electron positron collisions at next-to-next-to-leading order in the coupling α{sub s} of quantum chromodynamics at the differential level. Our formalism applies to the calculation of any infrared-safe observable. We apply this set-up to the production of top-quark top antiquark pairs in the continuum. We compute the production cross section and several distributions. We determine, in particular, the top-quark forward-backward asymmetry at order α{sub s}{sup 2}. Our result agrees with previous computations of this observable.

This paper describes a systolic array processor for a ring image Cherenkov counter which is capable of identifying pairs of electron circles with a known radius and a certain minimum distance within 15 μs. The processor is a very flexible and fast device. It consists of 128 x 128 processing elements (PEs), where one PE is assigned to each pixel of the image. All PEs run synchronously at 40 MHz. The identification of electron circles is done by correlating the detector image with the proper circle circumference. Circle centers are found by peak detection in the correlation result. A second correlation with a circle disc allows circles of closed electronpairs to be rejected. The trigger decision is generated if a pseudo adder detects at least two remaining circles. The device is controlled by a freely programmable sequencer. A VLSI chip containing 8 x 8 PEs is being developed using a VENUS design system and will be produced in 2μ CMOS technology.

This paper describes a systolic array processor for a ring image Cherenkov counter which is capable of identifying pairs of electron circles with a known radius and a certain minimum distance within 15 μs. The processor is a very flexible and fast device. It consists of 128x128 processing elements (PEs), where one PE is assigned to each pixel of the image. All PEs run synchronously at 40 MHz. The identification of electron circles is done by correlating the detector image with the proper circle circumference. Circle centers are found by peak detection in the correlation result. A second correlation with a circle disc allows circles of closed electronpairs to be rejected. The trigger decision is generated if a pseudo adder detects at least two remaining circles. The device is controlled by a freely programmable sequencer. A VLSI chip containing 8x8 PEs is being developed using a VENUS design system and will be produced in 2μ CMOS technology. (orig.)

Microwave effects on the spin adduct yield were observed in the photoreduction of menadione in micellar solutions with ordinary sodium dodecyl sulfate (SDS), deuterium-labeled SDS, and a mixture of them. A large isotope effect was found in the microwave modulation of the spin adduct yield, which is due to the ESR transitions of the transient radical pair in the reaction. It is demonstrated for the first time that the microwave field can be used to enrich one of the isotopes which coexist in the system

In the present thesis angular correlations of coincident electron-positron pairsnin heavy ion collisions are studied. It is meant as a contribution to the answer of fundamental questions in the quantum electrodynamics of strong fields. (orig./HSI) [de

Full Text Available Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet. This paper discusses findings from a ‘WestFocus’ survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors (‘Media’, ‘Logistics’, ‘Internet Services’ and ‘Food Processing’. After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.

We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

This paper presents the Security Analysis of the Electronic Management System (EMS) of a Total Site Utility System as proposed under the scope of the Efenis project. The Efenis project has been funded by the European Commission via the seventh framework programme (EC FP7) with the aim to improve ...

We have performed a theoretical and numerical analysis of the three dimensional dynamics of nonlinear dust ion-acoustic shock waves (DIASWs) in a magnetized plasma, consisting of positive and negative ion fluids, kappa distributed electrons, immobile dust particulates along with positive and negative ion kinematic viscosity. By employing the reductive perturbation technique, we have derived the nonlinear Zakharov-Kuznetsov-Burgers (ZKB) equation, in which the nonlinear forces are balanced by dissipative forces (associated with kinematic viscosity). It is observed that the characteristics of DIASWs are significantly affected by superthermality of electrons, magnetic field strength, direction cosines, dust concentration, positive to negative ions mass ratio and viscosity of positive and negative ions.

We employ first-principles Density Functional Theory (DFT) and time-dependent DFT (TDDFT) to elucidate structural, electronic and optical properties of a few recently reported triazole adenine nucleobase analogues. The results are compared against the findings obtained for both natural adenine nucleobase and available experimental data. The optical absorption of these adenine analogues are calculated both in gas-phase and in solvent (methanol) using Polarized Continuum Model (PCM). We find that all the analogues show a red-shifted absorption profile as compared to adenine. Our simulated emission spectra in solvent compare fairly well with experimentally observed results. We investigate base paring ability of these adenine analogues with thymine. The calculations on the intrinsic stability of these base pairs ascertain that all the adenine analogues form the hydrogen bonded Watson-Crick base pair with similar H-bonding energy as obtained for natural adenine-thymine base pair. In our study, we provide a microscopic origin of the low-energy absorption and emission peaks, observed experimentally.

Although the formation of transition metal-boron pairs is currently well established in silicon processing, the geometry of these complexes is still not completely understood. We investigated the lattice location of the transition metals manganese, iron, cobalt and nickel in n- and p+-type silicon by means of electron emission channeling. For manganese, iron and cobalt, we observed an increase of sites near the ideal tetrahedral interstitial position by changing the doping from n- to p+-type Si. Such increase was not observed for Ni. We ascribe this increase to the formation of pairs with boron, driven by Coulomb interactions, since the majority of iron, manganese and cobalt is positively charged in p+-type silicon while Ni is neutral. We propose that breathing mode relaxation around the boron ion within the pair causes the observed displacement from the ideal tetrahedral interstitial site. We discuss the application of the emission channeling technique in this system and, in particular, how it provides insi...

We employ first-principles Density Functional Theory (DFT) and time-dependent DFT (TDDFT) to elucidate structural, electronic and optical properties of a few recently reported triazole adenine nucleobase analogues. The results are compared against the findings obtained for both natural adenine nucleobase and available experimental data. The optical absorption of these adenine analogues are calculated both in gas-phase and in solvent (methanol) using Polarized Continuum Model (PCM). We find that all the analogues show a red-shifted absorption profile as compared to adenine. Our simulated emission spectra in solvent compare fairly well with experimentally observed results. We investigate base paring ability of these adenine analogues with thymine. The calculations on the intrinsic stability of these base pairs ascertain that all the adenine analogues form the hydrogen bonded Watson-Crick base pair with similar H-bonding energy as obtained for natural adenine-thymine base pair. In our study, we provide a microscopic origin of the low-energy absorption and emission peaks, observed experimentally.

We derive an analytic approximation for the emissivity of neutrino-pair bremsstrahlung (NPB) due to scattering of electrons by atomic nuclei in a neutron star (NS) crust of any realistic composition. The emissivity is expressed through generalized Coulomb logarithm by introducing an effective potential of electron-nucleus scattering. In addition, we study the conditions at which NPB in the crust is affected by strong magnetic fields and outline the main effects of the fields on neutrino emission in NSs. The results can be used for modelling of many phenomena in NSs, such as cooling of young isolated NSs, thermal relaxation of accreting NSs with overheated crust in soft X-ray transients and evolution of magnetars. (paper)

We have measured 121 Sb Moessbauer spectra at 20 K for 52 compounds of antimony(III). An Sb(III) atom with the electron configuration [Kr] 4d 10 5s 2 has a lone pairelectrons. The stereochemical property of the lone pair has been found to depend very much on the kinds of atoms surrounding the antimony atom and the configurations of the coordinating atoms.

In a joint effort the CERES/NA45 and TAPS collaborations have measured low-mass electronpairs in p-Be and p-Au collisions at 450 GeV/c at the CERN SPS. In the range covered up to approximate to 1.5 GeV/c(2) the mass spectra from p-Be and p-Au collisions are well explained by electronpairs from

Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

First principles calculations were used to study the structures and electrical levels of the self-interstitial in Ge. We considered the possibility of structural changes consequent with change in charge state and show these have important implications in the mobility and electrical activity of the defect. The theoretical model is compared to the results of low temperature electron irradiation in germanium reported in the literature

With the aid of Density Functional Theory (DFT), we designed 1,8-naphthyridine-2,7-diamine as a recognition molecule to read DNA base pairs for genomic sequencing by electron tunneling. NMR studies show that it can form stable triplets with both A : T and G : C base pairs through hydrogen bonding. Our results suggest that the naphthyridine molecule should be able to function as a universal base pair reader in a tunneling gap, generating distinguishable signatures under electrical bias for each of DNA base pairs.

As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

Polyoxometalates (POMs) are inorganic entities featuring extensive and sometimes unusual redox properties. In this work, several experimental techniques as well as density functional theory (DFT) calculations have been applied to identify and assess the relevance of factors influencing the redox potentials of POMs. First, the position of the Mo substituent atom in the Wells-Dawson structure, α1- or α2-P2W17Mo, determines the potential of the first 1e(-) reduction wave. For P2W(18-x)Mox systems containing more than one Mo atom, reduction takes place at successively more positive potentials. We attribute this fact to the higher electron delocalization when some Mo oxidizing atoms are connected. After having analyzed the experimental and theoretical data for the monosubstituted α1- and α2-P2W17Mo anions, some relevant facts arise that may help to rationalize the redox behavior of POMs in general. Three aspects concern the stability of systems: (i) the favorable electron delocalization, (ii) the unfavorable e(-)-e(-) electrostatic repulsion, and (iii) the favorable electronpairing. They explain trends such as the second reduction wave occurring at more positive potentials in α1- than in α2-P2W17Mo, and also the third electron reduction taking place at a less negative potential in the case of α2, reversing the observed behavior for the first and the second waves. In P2W17V derivatives, the nature of the first "d" electron is more localized because of the stronger oxidant character of V(V). Thus, the reduction potentials as well as the computed reduction energies (REs) for the second reduction of either isomer are closer to each other than in Mo-substituted POMs. This may be explained by the lack of electron delocalization in monoreduced P2W17V(IV) systems.

The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access

Full Text Available In a culture of fear, everyday life is experienced through the feeling of safety, part of which can be secured through certain electronic home security systems. Three films – Unlawful Entry (1992, Panic Room (2002 and When a Stranger Calls (2006 – will be used as examples in the attempt to consider the relationship between the fear of criminal activity – in this case break ins – and electronic home security systems. The basic premise of the research is that the culturally manufactured fear encourages the electronic home security system industry, the presence of which can, in turn, exasperate one’s fear of the risk of falling victim to violent crime.

Precise measurements of W-values, the average energy expended per electron-hole pair in liquid Ar and Xe, were made by the electron-pulse method, and that in liquid Kr by the steady conduction current method. The results showed that the W-values were clearly smaller than those in gaseous Ar, Xe and Kr as predicted by Doke. The results can be explained by the conduction bands which exist in these rare gas liquids as well as in the solid state. The enhanced ionization yield was observed for Xe-doped liquid Ar, and it was attributed to the ionizing excitation transfer process from Ar excitons to doped Xe. This is very similar to the Jesse effect in the gas phase. The saturated value of the enhanced ionization was in good agreement with the theoretical value, and it provides strong evidence for the existence of the exciton states in liquid Ar. Fano factors in liquid Ar, Kr, Xe and Xe-doped liquid Ar have been estimated from the Fano Formula, and they were smaller than those in the gas phase. The drift velocity of electrons in liquid Ar, liquid Ar-gas mixtures and liquid Xe have been measured with gridded ionization chambers. The average electron energy in liquid Ar has been measured. The electron-induced scintillations of liquid Xe and Ar have been studied. (Kato, T.)

The introduction of an electronic health record (ELGA) is a subject discussed for a long time in Austria. Another big step toward ELGA is made at the end of 2010 on the pilot project e-medication in three model regions; other projects should follow. In addition, projects of the ELGA structure are sped up on the part of the ELGA GmbH to install the base of a functioning electronic health record. Unfortunately, many of these initiatives take place, so to speak, secretly, so that in the consciousness of the general public - and that includes not only patients but also physicians and other healthcare providers - always concerns about protection and security of such a storage of health data arouse. In this article the bases of the planned act are discussed taking into account the data protection and data security.

We have studied the current-induced breakdown of superconductivity in wide (100--980 μm) and thin (0.25--0.98 μm) films of tin. It is shown that the current at which the resistance of the sample begins to rise rapidly in the process of the destruction of superconductivity by a current can be fairly well associated with the theoretical value of the pair-breaking current in the Ginzburg-Landau phenomenological approach (I/sub c//sup G L/). This effect is observed over a rather wide temperature region (up to ΔTapprox.0.7 K), depending on the electron mean free path in the films. The values of the critical currents outside the above-mentioned region correlate qualitatively with those determined by inhomogeneities of the films as proposed by Larkin and Ovchinnikov

A scanning tunneling microscope is used to explore the evolution of electron and Cooper-pair transport across single Mn-phthalocyanine molecules adsorbed on Pb(111) from tunneling to contact ranges. Normal-metal as well as superconducting tips give rise to a gradual transition of the Bardeen-Cooper-Schrieffer energy gap in the tunneling range into a zero-energy resonance close to and at contact. Supporting transport calculations show that in the normal-metal-superconductor junctions this resonance reflects the merging of in-gap Yu-Shiba-Rusinov states as well as the onset of Andreev reflection. For the superconductor-superconductor contacts, the zero-energy resonance is rationalized in terms of a finite Josephson current that is carried by phase-dependent Andreev and Yu-Shiba-Rusinov levels.

For a long time, extreme events happening in complex systems, such as financial markets, earthquakes, and neurological networks, were thought to follow power-law size distributions. More recently, evidence suggests that in many systems the largest and rarest events differ from the other ones. They are dragon kings, outliers that make the distribution deviate from a power law in the tail. Understanding the processes of formation of extreme events and what circumstances lead to dragon kings or to a power-law distribution is an open question and it is a very important one to assess whether extreme events will occur too often in a specific system. In the particular system studied in this paper, we show that the rate of occurrence of dragon kings is controlled by the value of a parameter. The system under study here is composed of two nearly identical chaotic oscillators which fail to remain in a permanently synchronized state when coupled. We analyze the statistics of the desynchronization events in this specific example of two coupled chaotic electronic circuits and find that modifying a parameter associated to the local instability responsible for the loss of synchronization reduces the occurrence of dragon kings, while preserving the power-law distribution of small- to intermediate-size events with the same scaling exponent. Our results support the hypothesis that the dragon kings are caused by local instabilities in the phase space.

The drug, 8-Hydroxy-7-methoxy-pyrrolo-[2,1-c][1,4] benzodiazepine-5-one, commonly christened as DC81 belongs to the pyrrolo-[2,1-c][1,4]benzodiazepine (PBDs) family. It is a member of the group of naturally occurring antitumour antibiotics produced by various Streptomyces species. The antitumour activity of DC81 is attributed to its sequence specific interaction with G-C rich DNA region in particular, for Pu-G-Pu motifs. In the present paper, physico-chemical properties DC81 have been carried out using an ab-initio method, HF/6-31G(d,p) with GAMESS program. MEP, HOMO and LUMO surfaces have been scanned. Ionization potential, electron affinity, electronegativity, global hardness and softness of the drug have been calculated. Further, drug-DNA interactions have been examined using modified second order perturbation theory along with multicentred-multipole expansion technique. Results have been discussed in the light of other theoretical and experimental observations. Efforts have been made to elucidate the binding patterns and thereby biological properties of the drug.

Abstract: Nowadays electronics is everywhere and we are surrounded with electronic gazettes many of them are helping us in maintaining security at various places, there are many security problems faced by banks, homes etc. Without proper and strong security a vault can be penetrated. A security system is used in residential, commercial, industrial, Medical and Militaries as well as personal protection. In this paper we are discussing about the various electronicsecurity sensor devices and te...

Factors affecting the structure and orientation of the crystallographic shear (CS) planes in anion-deficient perovskites were investigated using the (Pb(1-z)Sr(z))(1-x)Fe(1+x)O(3-y) perovskites as a model system. The isovalent substitution of Sr(2+) for Pb(2+) highlights the influence of the A cation electronic structure because these cations exhibit very close ionic radii. Two compositional ranges have been identified in the system: 0.05 ≤ z ≤ 0.2, where the CS plane orientation gradually varies but stays close to (203)p, and 0.3 ≤ z ≤ 0.45 with (101)p CS planes. The incommensurately modulated structure of Pb0.792Sr0.168Fe1.040O2.529 was refined from neutron powder diffraction data using the (3 + 1)D approach (space group X2/m(α0γ), X = (1/2, 1/2, 1/2, 1/2), a = 3.9512(1) Å, b = 3.9483(1) Å, c = 3.9165(1) Å, β = 93.268(2)°, q = 0.0879(1)a* + 0.1276(1)c*, RF = 0.023, RP = 0.029, and T = 900 K). A comparison of the compounds with different CS planes indicates that the orientation of the CS planes is governed mainly by the stereochemical activity of the lone-electron-pair cations inside the perovskite blocks.

We report on first measurements of low-mass electron-positron pairs in Pb-Au collisions at the CERN SPS beam energy of 40 AGeV. The observed pair yield integrated over the range of invariant masses 0.2e(+)e(-) annihilation with a modified rho propagator. They may be linked to chiral symmetry restoration and support the notion that the in-medium modifications of the rho are more driven by baryon density than by temperature.

We report on first measurements of low-mass electronpairs in Pb-Au collisions at the lower SPS beam energy of 40 AGeV. The pair yield integrated over the range of invariant masses 0.2 e+ e- annihilation with a modified rho-propagator. They may be linked to chiral symmetry restoration and support the notion that the in-medium modifications of the rho are more driven by baryon density than by temperature.

Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references. The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania. The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation. The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security. Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references.The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania.The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation.The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security.Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

Following the development of the Catpix I diffraction gratings structure first used on the 1988 Australian plastic DLR10 banknote and more recently on the Singapore plastic DLR50 banknote, the CSIRO Australia, Division of Materials Science & Technology has developed a new optical security and anti-counterfeiting technology known as Pixelgram (or Catpix 2). The Pixelgram, which is subject to patent, is an optically variable device based on a computerized procedure for producing an optically variable version of any given input picture, e.g., a photograph. When a Pixelgram is observed under a given source, such as a fluorescent tube, the image of the original input picture appears at particular angles of view. At other angles, the image varies in both contrast and brightness and can even appear as the photographic negative of the original input picture at some angles of view. As well as its ability to generate optically variable text and graphical images, Pixelgram has the unique capability of being able to display easily recognizable small scale optically variable images of the human face of near photographic clarity. Pixelgram optical security device master plates are produced by a technique borrowed from the microelectronics industry and known as electron beam lithography. In this technique, millions of microscopic grooves are written individually by a finely focused electron beam scanning across a glass plate coated with an electron sensitive material. On a typical Pixelgram there are approximately 2,000 million individual polygons etched into the plate by the electron beam. This corresponds to more than 10,000 megabytes of binary data. The only known electron beam lithography systems that have been able to write such large data files with the required precision are the Cambridge Instruments EBMF 10.5 and EBML 300 electron beam systems.

Background As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronicsecure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Objective Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. Methods We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Results Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70

As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronicsecure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70.2%, 262/373 vs 82.0%, 277/338), and

For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

We calculate the impact-parameter-dependent total probability P total (b) for the electromagnetic production of electron-positron pairs in relativistic heavy-ion collisions in lowest order. We study expecially impact parameters smaller than the Compton wavelength of the electron, where the equivalent-photon approximation cannot be used. Calculations with and without a form factor for the heavy ions are done; the influence is found to be small. The lowest-order results are found to violate unitarity and are used for the calculation of multiple-pair production probabilities with the help of the approximate Poisson distribution already found in earlier publications

Ionizing radiation can be detected by the measurement of the charge carriers produced in a detector. The improved semiconductor technology now allows detectors operating near the physical limits of the detector materials to be designed. The mean energy required for producing an electron-hole pair, W, is a material property of the semiconductor. Here, the determination of W from the spectral responsivity of photodiodes is demonstrated. Using spectrally dispersed synchrotron radiation, different types of semiconductor photodiodes have been examined in the UV-, VUV-, and soft X-ray spectral range. Their spectral responsivity was determined with relative uncertainties between 0.4% and 1% using a cryogenic electrical-substitution radiometer as primary detector standard. Results are presented for silicon n-on-p junction photodiodes and for GaAsP/Au Schottky diodes at room temperature. The investigations for silicon covered the complete spectral range from 3 to 1500 eV, yielding a constant value W=(3.66+-0.03) eV fo...

The time-dependent wavepacket diffusive method [X. Zhong and Y. Zhao, J. Chem. Phys. 138, 014111 (2013)] is extended to investigate the energy relaxation and separation of a hot electron-hole pair in organic aggregates with incorporation of Coulomb interaction and electron-phonon coupling. The pair initial condition generated by laser pulse is represented by a Gaussian wavepacket with a central momentum. The results reveal that the hot electron energy relaxation is very well described by two rate processes with the fast rate much larger than the slow one, consistent with experimental observations, and an efficient electron-hole separation is accomplished accompanying the fast energy relaxation. Furthermore, although the extra energy indeed helps the separation by overcoming the Coulomb interaction, the width of initial wavepacket is much sensitive to the separation efficiency and the narrower wavepacket generates the more separated charges. This behavior may be useful to understand the experimental controversy of the hot carrier effect on charge separation

We study the nonlinear process of e - e + pair creation by a nucleus which moves at a relativistic energy in the laboratory frame and collides with an intense x-ray laser beam. The collision system under consideration is chosen in such a way that the simultaneous absorption of at least two photons from the laser wave is required in order to exceed the energy threshold of the reaction. We calculate total and differential rates for both free-free and bound-free pair production. In the case of free-free pair creation we demonstrate the effect of the laser polarization on the spectra of the produced particles, and we show that at very high intensities the total rate exhibits features analogous to those well known from above-threshold ionization rates for atoms. In the case of bound-free pair creation a singularity is found in the laboratory frame angular distribution of the produced positron. This singularity represents a distinct characteristic of the bound-free pair production and allows one to separate this process from free-free pair creation even without detecting a bound state of the captured electron. For both types of pair creation we consider the dependences of the total rates on the collision parameters, give the corresponding scaling laws, and discuss the possibility to observe these nonlinear processes in a future experiment

Full Text Available This review describes an “electronic dog nose” based on a surface plasmon resonance (SPR sensor and an antigen–antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol, dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.

This review describes an "electronic dog nose" based on a surface plasmon resonance (SPR) sensor and an antigen-antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol), dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.

Full Text Available In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic Health Record (EHR, and this means that the clinician must acquire sufficient access right to access this document. As the EHR is within a collection of many other patients, the clinician would need to specify some requirements (such as a keyword which match the patient’s record, as well as having a valid access right. The complication begins when we do not want the server to learn anything from this query (as the server might be outsourced to other place. To encompass this situation, we define a new cryptographic primitive called Certificate-Based Encryption with Keyword Search (CBEKS, which will be suitable in this scenario. We also specify the corresponding security models, namely computational consistency, indistinguishability against chosen keyword and ciphertext attacks, indistinguishability against keyword-guessing attacks and collusion resistance. We provide a CBEKS construction that is proven secure in the standard model with respect to the aforementioned security models.

In this work we have compared manifestations of degenerate electron exchange (DEE) and dimerization reactions in MARY (magnetically affected reaction yield) spectroscopy and time-resolved magnetic field effects (TR-MFE) of radical ion pairs (RIPs). It is shown that dimerization results in phase and

To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright

In Tanzania agricultural extension agents traditionally collect field data on agriculture and food security on paper, covering most villages throughout the country. The process is expensive, slow and cumbersome and prone to data transcription errors when the data get entered at the district offices into electronic spreadsheets. Field data on the status and condition of agricultural crops, the population's nutritional status, food storage levels and other parameters are needed in near realtime for early warning to make critical but most importantly timely and appropriate decisions that are informed with verified data from the ground. With the ubiquitous distribution of cell phones, which are now used by the vast majority of the population in Tanzania including most farmers, new, efficient and cost-effective methods for field data collection have become available. Using smartphones and tablets data on crop conditions, pest and diseases, natural disasters and livelihoods can be collected and made available and easily accessible in near realtime. In this project we implemented a process for obtaining high quality electronic field data using the GeoODK application with a large network of field extension agents in Tanzania and Uganda. These efforts contribute to work being done on developing an advanced agriculture monitoring system for Tanzania, incorporating traditional data collection with satellite information and field data. The outcomes feed directly into the National Food Security Bulletin for Tanzania produced by the Ministry of Agriculture as well as a form a firm evidence base and field scale monitoring of the disaster risk financing in Uganda.

This paper speaks about the advantages, disadvantages, key requirements necessary of an electronic business, the infrastructure of the Internet, the existing main networks on the Internet, standards used to develop electronic business and the security of an e-business environment. As we know in an organization the information is an asset that has value and should be protected and diversified. We also propose an implementation model of an electronic business that interconnects two concepts: ER...

3D-SEM is a method, based on the stereophotogrammetry technique, which obtains three-dimensional topographic reconstructions starting typically from two SEM images, called the stereo-pair. In this work, a theoretical uncertainty evaluation of the stereo-pair technique, according to GUM (Guide to ...

The energy transfer between different channels is an important aspect in chemical reactions at surfaces. We investigate here in detail the energy transfer dynamics in a prototypical system, i.e., reactive and nonreactive scattering of CO2 on Ni(100), which is related to heterogeneous catalytic processes with Ni-based catalysts for CO2 reduction. On the basis of our earlier nine-dimensional potential energy surface for CO2/Ni(100), dynamical calculations have been done using the generalized Langevin oscillator (GLO) model combined with local density friction approximation (LDFA), in which the former accounts for the surface motion and the latter accounts for the low-energy electron-hole pair (EHP) excitation. In spite of its simplicity, it is found that the GLO model yields quite satisfactory results, including the significant energy loss and product energy disposal, trapping, and steering dynamics, all of which agree well with the ab initio molecular dynamics ones where many surface atoms are explicitly involved with high computational cost. However, the GLO model fails to describe the reactivity enhancement due to the lattice motion because it intrinsically does not incorporate the variance of barrier height on the surface atom displacement. On the other hand, in LDFA, the energy transferred to EHPs is found to play a minor role and barely alter the dynamics, except for slightly reducing the dissociation probabilities. In addition, vibrational state-selected dissociative sticking probabilities are calculated and previously observed strong mode specificity is confirmed. Our work suggests that further improvement of the GLO model is needed to consider the lattice-induced barrier lowering.

Cellular respiration is the process by which cells obtain energy from glucose and is a very important biological process in living cell. As cells do cellular respiration, they need a pathway to store and transport electrons, the electron transport chain. The function of the electron transport chain is to produce a trans-membrane proton electrochemical gradient as a result of oxidation-reduction reactions. In these oxidation-reduction reactions in electron transport chains, metal ions play very important role as electron donor and acceptor. For example, Fe ions are in complex I and complex II, and Cu ions are in complex IV. Therefore, to identify metal-binding sites in electron transporters is an important issue in helping biologists better understand the workings of the electron transport chain. We propose a method based on Position Specific Scoring Matrix (PSSM) profiles and significant amino acid pairs to identify metal-binding residues in electron transport proteins. We have selected a non-redundant set of 55 metal-binding electron transport proteins as our dataset. The proposed method can predict metal-binding sites in electron transport proteins with an average 10-fold cross-validation accuracy of 93.2% and 93.1% for metal-binding cysteine and histidine, respectively. Compared with the general metal-binding predictor from A. Passerini et al., the proposed method can improve over 9% of sensitivity, and 14% specificity on the independent dataset in identifying metal-binding cysteines. The proposed method can also improve almost 76% sensitivity with same specificity in metal-binding histidine, and MCC is also improved from 0.28 to 0.88. We have developed a novel approach based on PSSM profiles and significant amino acid pairs for identifying metal-binding sites from electron transport proteins. The proposed approach achieved a significant improvement with independent test set of metal-binding electron transport proteins.

Exciplex emission spectra and rate constants of their decay via internal conversion and intersystem crossing are studied and discussed in terms of conventional radiationless transition approach. Exciplexes of 9-cyanophenanthrene with 1,2,3-trimethoxybenzene and 1,3,5-trimethoxybenzene were studied in heptane, toluene, butyl acetate, dichloromethane, butyronitrile, and acetonitrile. A better description of spectra and rate constants is obtained using 0-0 transition energy and Gauss broadening of vibrational bands rather than the free energy of electron transfer and reorganization energy. The coincidence of parameters describing exciplex emission spectra and dependence of exciplex decay rate constants on energy gap gives the evidence of radiationless quantum transition mechanism rather than thermally activated medium reorganization mechanism of charge recombination in exciplexes and excited charge transfer complexes (contact radical ion pairs) as well as in solvent separated radical ion pairs. Radiationless quantum transition mechanism is shown to provide an appropriate description also for the main features of exergonic excited-state charge separation reactions if fast mutual transformations of loose and tight pairs of reactants are considered. In particular, very fast electron transfer (ET) in tight pairs of reactants with strong electronic coupling of locally excited and charge transfer states can prevent the observation of an inverted region in bimolecular excited-state charge separation even for highly exergonic reactions.

This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.

The American Heritage dictionary defines the word "web" as "something intricately contrived, especially something that ensnares or entangles." The wealth of medical resources on the World Wide Web is now so extensive, yet disorganized and unmonitored, that such a definition seems fitting. In emergency medicine, for example, a field in which accurate and complete information, including patients' records, is urgently needed, more than 5000 Web pages are available today, whereas fewer than 50 were available in December 1994. Most sites are static Web pages using the Internet to publish textbook material, but new technology is extending the scope of the Internet to include online medical education and secure exchange of clinical information. This article lists some of the best Web sites for use in emergency medicine and then describes a project in which the Web is used for transmission and protection of electronic medical records.

There are many similarities between the properties of nucleons in nuclei and electrons in metals. In addition to the properties explainable in terms of independent particle motion, there are many important co-operative effects suggesting correlated motion. Pairing correlation which leads to superconductivity in metals and several important properties in nuclei , is an exmple of such correlations. An attempt has been made to review the effects of pairing correlations in nuclei. Recent indications of reduction in pairing correlations at high angular momenta is discussed. A comparision between pairing correlations in the cases of nuclei and electrons in metals is attempted. (author). 20 refs., 10 figs

We report on measurements of low-mass electronpairs in 450 GeV p-Be, p-Au, and 200 GeV/nucleon S-Au collisions at central rapidities. For the proton induced interactions, the low-mass spectra are, within the systematic errors, satisfactorily explained by electronpairs from hadron decays, whereas in the S-Au system an enhancement over the hadronic contributions by a factor of 5.0±0.7(stat)±2.0(syst) in the invariant mass range 0.2 2 is observed. The properties of the excess suggest that it arises from two-pion annihilation ππ→e + e -

The electron affinity and the propensity to electron-induced proton transfer (PT) of hydrogen-bonded complexes between the Watson-Crick adenine-thymine pair (AT) and simple organic acid (HX), attached to adenine in the Hoogsteen-type configuration, were studied at the B3LYP/6-31+G** level. Although the carboxyl group is deprotonated at physiological pH, its neutral form, COOH, resembles the peptide bond or the amide fragment in the side chain of asparagine (Asn) or glutamine (Gln). Thus, these complexes mimic the interaction between the DNA environment (e.g., proteins) and nucleobase pairs incorporated in the biopolymer. Electron attachment is thermodynamically feasible and adiabatic electron affinities range from 0.41 to 1.28 eV, while the vertical detachment energies of the resulting anions span the range of 0.39-2.88 eV. Low-energy activation barriers separate the anionic minima: aHX(AT) from the more stable single-PT anionic geometry, aHX(AT)-SPT, and aHX(AT)-SPT from the double-PT anionic geometry, aHX(AT)-DPT. Interaction between the adenine of the Watson-Crick AT base pair with an acidic proton donor probably counterbalances the larger EA of isolated thymine, as SOMO is almost evenly delocalized over both types of nucleic bases in the aHX(AT) anions. Moreover, as a result of PT the excess electron localizes entirely on adenine. Thus, in DNA interacting with its physiological environment, damage induced by low-energy electrons could begin, contrary to the current view, with the formation of purine anions, which are not formed in isolated DNA because of the greater stability of anionic pyrimidines.

The influence of anisotropic hyperfine interaction on transient nutation electron paramagnetic resonance (EPR) of light-induced spin-correlated radical pairs is studied theoretically using the density operator formalism. Analytical expressions for the time evolution of the transient EPR signal during selective microwave excitation of single transitions are derived for a model system comprised of a weakly coupled radical pair and one hyperfine-coupled nucleus with I=1/2. Zero-quantum electron coherence and single-quantum nuclear coherence are created as a result of the sudden light-induced generation of the radical pair state from a singlet-state precursor. Depending on the relative sizes of the nuclear Zeeman frequency and the secular and pseudo-secular parts of the hyperfine coupling, transitions between levels with different nuclear spin orientations are predicted to modulate the time-dependent EPR signal. These modulations are in addition to the well-known transient nutations and electron zero-quantum precessions. Our calculations provide insight into the mechanism of recent experimental observations of coherent nuclear modulations in the time-resolved EPR signals of doublets and radical pairs. Two distinct mechanisms of the modulations are presented for various microwave magnetic field strengths. The first modulation scheme arises from electron and nuclear coherences initiated by the laser excitation pulse and is "read out" by the weak microwave magnetic field. While the relative modulation depth of these oscillations with respect to the signal intensity is independent of the Rabi frequency, ω1, the frequencies of this coherence phenomenon are modulated by the effective microwave amplitude and determined by the nuclear Zeeman interaction and hyperfine coupling constants as well as the electron-electron spin exchange and dipolar interactions between the two radical pair halves. In a second mechanism the modulations are both created and detected by the microwave

The Monte-Carlo simulations are used to investigate the dissociation of a Coulomb correlated charge pair at an idealized interface between an electron accepting and an electron donating molecular material. In the simulations the materials are represented by cubic lattices of sites, with site the energies spread according to Gaussian distributions. The influence of temperature, applied external fields, and the width of the Gaussian densities of states distribution for both the electron and the hole transporting material are investigated. The results show that the dissociation of geminate charge pairs is assisted by disorder and the results can be understood in terms of a two-step model. In the first step, the slow carrier in the most disordered material jumps away from the interface. In the following, second step, the reduced Coulombic attraction allows the faster carrier in the less disordered material to escape from the interface by thermally activated hopping. When the rate for geminate recombination at the interface is very low ( -1 ) the simulations predict a high yield for carrier collection, as observed experimentally. Comparison of the simulated and experimentally observed temperature dependence of the collection efficiency indicates that at low temperature dissociation of the geminate charge pairs may be one of the factors limiting the device performance

The start of proton-proton collisions at the LHC inaugurates a new era in high-energy physics. It enables the possibility of discoveries at the high-energy frontier and also allows for studies of known Standard Model processes with unrivalled precision. Top quark pairs are produced at high rates and allow for precision measurements of the properties of the top quark with high statistics. The measurement of the top quark pair production cross section in proton-proton collisions at {radical}(s)=7 TeV is presented using the dileptonic decay channel with a muon-electronpair in the final state. The data sample, which is used in this analysis, corresponds the complete 2010 data taking period with an integrated luminosity of 35.9 pb{sup -1}. Top quark pair candidate events are selected in a cut-based event selection. Based on 59 observed muon-electron events in the final state event sample, the top quark pair production cross section is measured to be {sigma}{sub t} {sub anti} {sub t}=(156{+-}25(stat.){+-}14(sys.)) pb. Furthermore, a kinematic event reconstruction is applied, which is complementary to the use of b-tagging techniques, and validates the top quark-like topology of the selected events. First results from the measurement of differential cross sections based on the data from the complete 2010 data taking period are presented. For the first time in the CMS collaboration, the cross section of the production of top quark pairs is measured differentially as a function of the kinematic observables of the final state objects, such as the transverse momentum p{sub T} of the leptons and the invariant mass of the lepton pair. Based on the solution of the kinematic event reconstruction, the cross section is also calculated differentially as a function of the kinematic properties of the reconstructed top-antitop quark pair. First results from the measurement of differential cross sections as a function of the kinematics of the final state leptons are presented, using the

The start of proton-proton collisions at the LHC inaugurates a new era in high-energy physics. It enables the possibility of discoveries at the high-energy frontier and also allows for studies of known Standard Model processes with unrivalled precision. Top quark pairs are produced at high rates and allow for precision measurements of the properties of the top quark with high statistics. The measurement of the top quark pair production cross section in proton-proton collisions at √(s)=7 TeV is presented using the dileptonic decay channel with a muon-electronpair in the final state. The data sample, which is used in this analysis, corresponds the complete 2010 data taking period with an integrated luminosity of 35.9 pb -1 . Top quark pair candidate events are selected in a cut-based event selection. Based on 59 observed muon-electron events in the final state event sample, the top quark pair production cross section is measured to be σ t anti t =(156±25(stat.)±14(sys.)) pb. Furthermore, a kinematic event reconstruction is applied, which is complementary to the use of b-tagging techniques, and validates the top quark-like topology of the selected events. First results from the measurement of differential cross sections based on the data from the complete 2010 data taking period are presented. For the first time in the CMS collaboration, the cross section of the production of top quark pairs is measured differentially as a function of the kinematic observables of the final state objects, such as the transverse momentum p T of the leptons and the invariant mass of the lepton pair. Based on the solution of the kinematic event reconstruction, the cross section is also calculated differentially as a function of the kinematic properties of the reconstructed top-antitop quark pair. First results from the measurement of differential cross sections as a function of the kinematics of the final state leptons are presented, using the data recorded in the first part of the

With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET...

Perceptions of the susceptibility of young children to becoming lost or being abducted, and of the potential usefulness of child electronicsecurity devices, were examined via a questionnaire. Data were provided by 41 volunteers, most of them from a local government office centre. The questionnaire asked for demographic data, and then for the risk of a child being abducted or lost when under the supervision of different caregivers and in different situations. The probable effectiveness of three common abductor ploys was also addressed. The questionnaire concluded with 10 questions about child electronicsecurity devices. Respondents viewed mothers, fathers, and grandparents as equally responsible caregivers and young adults/babysitters as the least responsible. These effects diminished as the age of the children increased. The garden at home was judged to be the most secure environment for children of all ages, while an amusement park was judged the least secure environment. Children were perceived to be more at risk of an abduction when a stranger asked for physical assistance or to take them to the hospital because their parents were hurt, than when asked for directions. Furthermore, the respondents expressed a moderately strong need for child electronicsecurity devices, and viewed parents who use them as more responsible than those who do not.

There have been concerns that Electromagnetic security systems such as walk-through metal detectors (WTMDs) can potentially cause electromagnetic interference (EMI) in certain active medical devices including implantable cardiac pacemakers and implantable neurostimulators. Incidents of EMI between WTMDs and active medical devices also known as personal medical electronic devices (PMED) continue to be reported. This paper reports on emission measurements of sample WTMDs and testing of 20 PMEDs in a WTMD simulation system. Magnetic fields from sample WTMD systems were characterized for emissions and exposure of certain PMEDs. A WTMD simulator system designed and evaluated by FDA in previous studies was used to mimic the PMED exposures to the waveform from sample WTMDs. The simulation system allows for controlled PMED exposure enabling careful study with adjustable magnetic field strengths and exposure duration, and provides flexibility for PMED exposure at elevated levels in order to study EMI effects on the PMED. The PMED samples consisted of six implantable cardiac pacemakers, six implantable cardioverter defibrillators (ICD), five implantable neurostimulators, and three insulin pumps. Each PMED was exposed in the simulator to the sample WTMD waveforms using methods based on appropriate consensus test standards for each of the device type. Testing the sample PMEDs using the WTMD simulator revealed EMI effects on two implantable pacemakers and one implantable neurostimulator for exposure field strength comparable to actual WTMD field strength. The observed effects were transient and the PMEDs returned to pre-exposure operation within a few seconds after removal from the simulated WTMD exposure fields. No EMI was observed for the sample ICDs or insulin pumps. The findings are consistent with earlier studies where certain sample PMEDs exhibited EMI effects. Clinical implications were not addressed in this study. Additional studies are needed to evaluate potential PMED

The Standard Model of particle physics was developed to describe the fundamental particles, which form matter, and their interactions via the strong, electromagnetic and weak force. Although most measurements are described with high accuracy, some observations indicate that the Standard Model is incomplete. Numerous extensions were developed to solve these limitations. Several of these extensions predict heavy resonances, so-called Z' bosons, that can decay into an electron positron pair. The particle accelerator Large Hadron Collider (LHC) at CERN in Switzerland was built to collide protons at unprecedented center-of-mass energies, namely 7 TeV in 2011. With the data set recorded in 2011 by the ATLAS detector, a large multi-purpose detector located at the LHC, the electron positron pair mass spectrum was measured up to high masses in the TeV range. The properties of electrons and the probability that other particles are mis-identified as electrons were studied in detail. Using the obtained information, a sophisticated Standard Model expectation was derived with data-driven methods and Monte Carlo simulations. In the comparison of the measurement with the expectation, no significant deviations from the Standard Model expectations were observed. Therefore exclusion limits for several Standard Model extensions were calculated. For example, Sequential Standard Model (SSM) Z' bosons with masses below 2.10 TeV were excluded with 95% Confidence Level (C.L.).

The Standard Model of particle physics was developed to describe the fundamental particles, which form matter, and their interactions via the strong, electromagnetic and weak force. Although most measurements are described with high accuracy, some observations indicate that the Standard Model is incomplete. Numerous extensions were developed to solve these limitations. Several of these extensions predict heavy resonances, so-called Z' bosons, that can decay into an electron positron pair. The particle accelerator Large Hadron Collider (LHC) at CERN in Switzerland was built to collide protons at unprecedented center-of-mass energies, namely 7 TeV in 2011. With the data set recorded in 2011 by the ATLAS detector, a large multi-purpose detector located at the LHC, the electron positron pair mass spectrum was measured up to high masses in the TeV range. The properties of electrons and the probability that other particles are mis-identified as electrons were studied in detail. Using the obtained information, a sophisticated Standard Model expectation was derived with data-driven methods and Monte Carlo simulations. In the comparison of the measurement with the expectation, no significant deviations from the Standard Model expectations were observed. Therefore exclusion limits for several Standard Model extensions were calculated. For example, Sequential Standard Model (SSM) Z' bosons with masses below 2.10 TeV were excluded with 95% Confidence Level (C.L.).

3D-SEM is a method, based on the stereophotogrammetry technique, which obtains three-dimensional topographic reconstructions starting typically from two SEM images, called the stereo-pair. In this work, a theoretical uncertainty evaluation of the stereo-pair technique, according to GUM (Guide to the Expression of Uncertainty in Measurement), was carried out, considering 3D-SEM reconstructions of a wire gauge with a reference diameter of 250 µm. Starting from the more commonly used tilting strategy, one based on the item rotation inside the SEM chamber was also adopted. The latter enables multiple-view reconstructions of the cylindrical item under consideration. Uncertainty evaluation was performed starting from a modified version of the Piazzesi equation, enabling the calculation of the z-coordinate from a given stereo-pair. The metrological characteristics of each input variable have been taken into account and a SEM stage calibration has been performed. Uncertainty tables for the cases of tilt and rotation were then produced, leading to the calculation of expanded uncertainty. For the case of rotation, the largest uncertainty contribution resulted to be the rotational angle; however, for the case of tilt it resulted to be the pixel size. A relative expanded uncertainty equal to 5% and 4% was obtained for the case of rotation and tilt, respectively

In recent years, demographic change and increasing treatment costs demand the adoption of more cost efficient, highly qualitative and integrated health care processes. The rapid growth and availability of the Internet facilitate the development of eHealth services and especially of electronic health records (EHRs) which are promising solutions to meet the aforementioned requirements. Considering actual web-based EHR systems, patient-centric and patient moderated approaches are widely deployed. Besides, there is an emerging market of so called personal health record platforms, e.g. Google Health. Both concepts provide a central and web-based access to highly sensitive medical data. Additionally, the fact that these systems may be hosted by not fully trustworthy providers necessitates to thoroughly consider privacy issues. In this paper we define security and privacy objectives that play an important role in context of web-based EHRs. Furthermore, we discuss deployed solutions as well as concepts proposed in the literature with respect to this objectives and point out several weaknesses. Finally, we introduce a system which overcomes the drawbacks of existing solutions by considering an holistic approach to preserve patient's privacy and discuss the applied methods.

The United States is at target. For those of us who grew up curing the cold war this is not news; however, the threat is different than it has been in the past. Now it may be another super power or it may be a teenage child with a personal computer. Both government and civilian entities are potential targets. The national information infrastructure (NII) is the real target. The determined hacker can bring down not only government systems, but the power-grid, the financial system, or the air traffic control system as well. All organizations must be aware of the threat and be prepared to react appropriately. Of course, the federal government has begun to protect their critical systems. However, many American corporations have not yet fully protected their systems. Since there is a common threat, common standards for countermeasures are applicable. This paper reports on the use of an electronic meeting room technology by government, industry, and academia to establish a national training standard. If you are a CIO or advise one about security matters, these standards are important.

Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

An investigation was carried out concerning the traceability of dimensional measurements performed with the scanning electron microscope (SEM) using reconstruction of surface topography through stereo-photogrammetry. A theoretical description of the effects that the main instrumental variables...... with the scanning electron microscope (SEM) using reconstruction of surface topography through stereo-photogrammetry. A theoretical description of the effects that the main instrumental variables and measurement parameters have on the reconstruction accuracy of any point on the surface of the object being imaged......-dimensional topography of the type C roughness standards showed good agreement with the nominal profile wavelength values. An investigation was carried out concerning the traceability of dimensional measurements performed with the scanning electron microscope (SEM) using reconstruction of surface topography through...

Ultra strong electromagnetic fields can lead to spontaneous creation of single or multiple electron–positron pairs. A quantum field theoretical treatment of the pair creation process combined with numerical methods provides a description of the fermionic quantum field state, from which all observables of the multiple electron–positron pairs can be inferred. This allows to study the complex multi-particle dynamics of electron–positron pair creation in-depth, including multi-pair statistics as well as momentum distributions and spin. To illustrate the potential benefit of this approach, it is applied to the intermediate regime of pair creation between nonperturbative Schwinger pair creation and perturbative multiphoton pair creation where the creation of multi-pair states becomes nonnegligible but cascades do not yet set in. Furthermore, it is demonstrated how spin and helicity of the created electrons and positrons are affected by the polarization of the counterpropagating laser fields, which induce the creation of electron–positron pairs.

Ultra strong electromagnetic fields can lead to spontaneous creation of single or multiple electron–positron pairs. A quantum field theoretical treatment of the pair creation process combined with numerical methods provides a description of the fermionic quantum field state, from which all observables of the multiple electron–positron pairs can be inferred. This allows to study the complex multi-particle dynamics of electron–positron pair creation in-depth, including multi-pair statistics as well as momentum distributions and spin. To illustrate the potential benefit of this approach, it is applied to the intermediate regime of pair creation between nonperturbative Schwinger pair creation and perturbative multiphoton pair creation where the creation of multi-pair states becomes nonnegligible but cascades do not yet set in. Furthermore, it is demonstrated how spin and helicity of the created electrons and positrons are affected by the polarization of the counterpropagating laser fields, which induce the creation of electron–positron pairs.

Highlights: • Dynamics of excess electron attachment to guanine–cytosine base pair. • Ring-polymer and classical molecular dynamics simulations are performed. • Temperature and isotope substitution effects are investigated. - Abstract: The dynamical process of electron attachment to a guanine–cytosine pair in the normal (h-GC) and deuterated (d-GC) forms has been studied theoretically by semiclassical ring-polymer molecular dynamics (RPMD) simulations using the empirical valence bond model. The initially formed dipole-bound anion is converted rapidly to the valence-bound anion within about 0.1 ps in both h-GC and d-GC. However, the subsequent proton transfer in h-GC occurs with a rate five times greater than the deuteron transfer in d-GC. The change of rates with isotopic substitution and temperature variation in the RPMD simulations are quantitatively and qualitatively different from those in the classical molecular dynamics (MD) simulations, demonstrating the importance of nuclear quantum effects on the dynamics of this system.

Highlights: • Dynamics of excess electron attachment to guanine–cytosine base pair. • Ring-polymer and classical molecular dynamics simulations are performed. • Temperature and isotope substitution effects are investigated. - Abstract: The dynamical process of electron attachment to a guanine–cytosine pair in the normal (h-GC) and deuterated (d-GC) forms has been studied theoretically by semiclassical ring-polymer molecular dynamics (RPMD) simulations using the empirical valence bond model. The initially formed dipole-bound anion is converted rapidly to the valence-bound anion within about 0.1 ps in both h-GC and d-GC. However, the subsequent proton transfer in h-GC occurs with a rate five times greater than the deuteron transfer in d-GC. The change of rates with isotopic substitution and temperature variation in the RPMD simulations are quantitatively and qualitatively different from those in the classical molecular dynamics (MD) simulations, demonstrating the importance of nuclear quantum effects on the dynamics of this system.

M-DNA is a type of metalated DNA that forms at high pH and in the presence of Zn, Ni, and Co, with the metals placed in between each base pair, as in G-Zn-C. Experiments have found that M-DNA could be a promising candidate for a variety of nanotechnological applications, as it is speculated that the metal d-states enhance the conductivity, but controversy still clouds these findings. In this paper, we carry out a comprehensive ab initio study of eight G-Zn-C models in the gas phase to help discern the structure and electronic properties of Zn-DNA. Specifically, we study whether a model prefers to be planar and has electronic properties that correlate with Zn-DNA having a metallic-like conductivity. Out of all the studied models, there is only one which preserves its planarity upon full geometry optimization. Nevertheless, starting from this model, one can deduce a parallel Zn-DNA architecture only. This duplex would contain the imino proton, in contrast to what has been proposed experimentally. Among the nonplanar models, there is one that requires less than 8 kcal/mol to flatten (both in gas and solvent conditions), and we propose that it is a plausible model for building an antiparallel duplex. In this duplex, the imino proton would be replaced by Zn, in accordance with experimental models. Neither planar nor nonplanar models have electronic properties that correlate with Zn-DNA having a metallic-like conductivity due to Zn d-states. To understand whether density functional theory (DFT) can describe appropriately the electronic properties of M-DNAs, we have investigated the electronic properties of G-Co-C base pairs. We have found that when self-interaction corrections (SIC) are not included the HOMO state contains Co d-levels, whereas these levels are moved below the HOMO state when SIC are considered. This result indicates that caution should be exercised when studying the electronic properties of M-DNAs with functionals that do not account for strong

Time dependent density matrix functional theory in its adiabatic linear response formulation delivers exact excitation energies ω α and oscillator strengths f α for two-electron systems if extended to the so-called phase including natural orbital (PINO) theory. The Löwdin-Shull expression for the energy of two-electron systems in terms of the natural orbitals and their phases affords in this case an exact phase-including natural orbital functional (PILS), which is non-primitive (contains other than just J and K integrals). In this paper, the extension of the PILS functional to N-electron systems is investigated. With the example of an elementary primitive NO functional (BBC1) it is shown that current density matrix functional theory ground state functionals, which were designed to produce decent approximations to the total energy, fail to deliver a qualitatively correct structure of the (inverse) response function, due to essential deficiencies in the reconstruction of the two-body reduced density matrix (2RDM). We now deduce essential features of an N-electron functional from a wavefunction Ansatz: The extension of the two-electron Löwdin-Shull wavefunction to the N-electron case informs about the phase information. In this paper, applications of this extended Löwdin-Shull (ELS) functional are considered for the simplest case, ELS(1): one (dissociating) two-electron bond in the field of occupied (including core) orbitals. ELS(1) produces high quality ω α (R) curves along the bond dissociation coordinate R for the molecules LiH, Li 2 , and BH with the two outer valence electrons correlated. All of these results indicate that response properties are much more sensitive to deficiencies in the reconstruction of the 2RDM than the ground state energy, since derivatives of the functional with respect to both the NOs and the occupation numbers need to be accurate

We study the nature of the electronpairing at the most important critical points of the singlet potential energy surface of the 2O2 O4 reaction and its evolution along the reaction coordinate using the electronpair localization function (EPLF) [Scemama, A.; Chaquin, P.; Caffarel, M. J. Chem. Phys. 2004, 121, 1725]. To do that, the 3D topology of the EPLF calculated with quantum Monte Carlo (at both variational and fixed-node-diffusion Monte Carlo levels) using Hartree-Fock, multiconfigurational CASSCF, and explicitly correlated trial wave functions is analyzed. At the O4 equilibrium geometry the EPLF analysis reveals four equivalent covalent bonds and two lone pairs on each oxygen atom. Along the reaction path toward dissociation it is found that the two oxygen-oxygen bonds are not broken simultaneously but sequentially, and then the lone pairs are rearranged. In a more general perspective, the usefulness of the EPLF as a unique tool to analyze the topology of electronpairing in nontrivial chemical bonding situations as well as to visualize the major steps involved in chemical reactivity is emphasized. In contrast with most standard schemes to reveal electron localization (atoms in molecules, electron localization function, natural bond orbital, etc.), the newly introduced EPLF function gives a direct access to electronpairings in molecules.

Fuel cell vehicles have been identified as the personal transportation technology of the future because of their high efficiency and very low emissions. To achieve the goal of road-ready fuel cell vehicles, great strides must be made in the development of fuel cells, hydrogen production and hydrogen storage technologies, that includes metal-H interaction studies and safety considerations. The interaction between two-hydrogen atoms and a {gamma}-Fe structure containing a vacancy has been studied using a cluster model and a theoretical method. For the study of the sequential absorption, the hydrogen atoms were positioned in their energy minima configurations, near the vacancy. The interactions mainly involve Fe 4s-H 1s atomic orbitals. The contribution of Fe 4p and Fe 3d orbitals is much less important. The Fe-Fe bond is weakened as new Fe-H-H and H-H pairs were formed. The effect of H atoms is limited to its first Fe neighbors. The Fe-Fe bond strength decreases with the introduction of the H atoms. Fe-H bonding is achieved at expense of weakening the metal-metal nearest bonds. There is not a real bond between the H atoms but some H-H interaction is observed. The detrimental effect of H atoms on the Fe-Fe bonds can be related to one of the aspect of embrittlement in {gamma}-Fe. (author)

Nearly 50 years elapsed between the discovery of superconductivity and the emergence of the microscopic theory describing this zero resistance state. The explanation required a novel phase of matter in which conduction electrons joined in weakly bound pairs and condensed with other pairs into a single quantum state. Surprisingly, this Cooper pair formation has also been invoked to account for recently uncovered high-resistance or insulating phases of matter. To address this possibility, we have used nanotechnology to create an insulating system that we can probe directly for Cooper pairs. I will present the evidence that Cooper pairs exist and dominate the electrical transport in these insulators and I will discuss how these findings provide new insight into superconductor to insulator quantum phase transitions.

The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

Full Text Available The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

Highlights: • We synthesize complexes of PbS quantum dots (QDs) and tetracyanoquinodimethane (TCNQ). Each PbS QD spontaneously reduces up to 17 TCNQ molecules. • The photoluminescence of the PbS QDs is quenched in the presence of the reduced TCNQ species through ultrafast non-radiative, simultaneous decay of the electron and hole. • We assign this decay to a four-carrier, concerted charge recombination mechanism with the surface localized sulfur–TCNQ{sup x−} ion pair. - Abstract: This paper describes the ultrafast decay of the band-edge exciton in PbS quantum dots (QDs) through simultaneous recombination of the excitonic hole and electron with the surface localized ion pair formed upon adsorption of tetracyanoquinodimethane (TCNQ). Each PbS QD (R = 1.8 nm) spontaneously reduces up to 17 TCNQ molecules upon adsorption of the TCNQ molecule to a sulfur on the QD surface. The photoluminescence of the PbS QDs is quenched in the presence of the reduced TCNQ species through ultrafast (⩽15-ps) non-radiative decay of the exciton; the rate constant for the decay process increases approximately linearly with the number of adsorbed, reduced TCNQ molecules. Near-infrared and mid-infrared transient absorption show that this decay occurs through simultaneous transfer of the excitonic electron and hole, and is assigned to a four-carrier, concerted charge recombination mechanism based on the observations that (i) the PL of the QDs recovers when spontaneously reduced TCNQ{sup 1−} desorbs from the QD surface upon addition of salt, and (ii) the PL of the QDs is preserved when another spontaneous oxidant, ferrocinium, which cannot participate in charge transfer in its reduced state, is substituted for TCNQ.

We introduce the notion of a Mahonian pair. Consider the set, P^*, of all words having the positive integers as alphabet. Given finite subsets S,T of P^*, we say that (S,T) is a Mahonian pair if the distribution of the major index, maj, over S is the same as the distribution of the inversion number, inv, over T. So the well-known fact that maj and inv are equidistributed over the symmetric group, S_n, can be expressed by saying that (S_n,S_n) is a Mahonian pair. We investigate various Mahonia...

This thesis fits into the first operating years of the Large Hadron Collider. This monumental machine was built to explore the infinitesimal structure of matter at the multi-TeV scale. The LHC aimed primarily at searching for the Higgs boson, the discovery of which would confirm the electroweak symmetry breaking model. This mechanism, which provides W and Z bosons with a mass, describes the transition from a unified electroweak interaction to a weak interaction (short range) and an electromagnetic interaction (infinite range). The LHC's proton collisions, operated at a 50 ns period, are analysed by 4 large detectors, including the Compact Muon Solenoid (CMS). This small period allows to observe very rare phenomena, such as the Higgs boson production and decay, but it requires a fast online selection of the interesting collisions: the trigger system. The computing resources available for the data's storage and analysis set a limit to the trigger rate. Therefore the bandwidth, which is split into several physics signals, must be optimised. Firstly, I studied the electron trigger: electrons are a clear signature in the intense hadronic environment within the LHC and allow a high measurement accuracy, as well as a search for rare signals. Besides, they are part of the final states investigated by a large number of analyses (Higgs, electroweak, etc). From the first collisions in 2010, anomalous signals in the CMS electromagnetic calorimeter (ECAL) were a source of uncontrolled trigger rate increase. Indeed, their production rate increased along with the collisions' energy and intensity: they were likely to saturate the bandwidth as early as 2011, crippling drastically the CMS physics performances. I optimised the anomalous signal rejection algorithm, while conserving an excellent electron triggering efficiency, as regards the data collected in 2011. Moreover, the increasing intensity of the LHC collisions causes a loss of transparency in the ECAL crystals. The setting

The H-Fe interaction near a bcc Fe vacancy is analysed using a semi-empirical theoretical method. Calculations were performed using a Fe{sub 86} cluster with a vacancy. Hydrogen atoms are positioned in their local energy minima configurations. Changes in the electronic structure of Fe atoms near a vacancy were analysed for the system without H, with one H and with two H atoms. Fe atoms surrounding the vacancy weaken their bond when hydrogen is present. This is due to the formation of H-Fe bonds. Hydrogen influences only its nearest-neighbour Fe atoms. The H-H interaction was also analysed. For H-H distance of 0.82 Angstrom an H-H association is formed, while H-Fe interaction and Fe-Fe weakening is markedly reduced, when compared with other H-H interactions. (author)

Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

We report on the theoretical and experimental study of spin-dependent electronic transition rates which are controlled by a radiation-induced spin-Rabi oscillation of weakly spin-exchange and spin-dipolar coupled paramagnetic states (S=(1)/(2)). The oscillation components [the Fourier content, F(s)] of the net transition rates within spin-pair ensembles are derived for randomly distributed spin resonances, with an account of a possible correlation between the two distributions corresponding to individual pair partners. Our study shows that when electrically detected Rabi spectroscopy is conducted under an increasing driving field B1, the Rabi spectrum, F(s), evolves from a single peak at s=ΩR, where ΩR=γB1 is the Rabi frequency (γ is the gyromagnetic ratio), to three peaks at s=ΩR, s=2ΩR, and low s≪ΩR. The crossover between the two regimes takes place when ΩR exceeds the expectation value δ0 of the difference in the Zeeman energies within the pairs, which corresponds to the broadening of the magnetic resonance by disorder caused by a hyperfine field or distributions of Landé g factors. We capture this crossover by analytically calculating the shapes of all three peaks at an arbitrary relation between ΩR and δ0. When the peaks are well developed their widths are Δs˜δ02/ΩR. We find a good quantitative agreement between the theory and experiment.

Experimental measurements of the total energy lost per electron-ion pair lost, ε T , were performed in a low-pressure inductive atomic gases (Ar, He) and molecular gases (O 2 , N 2 ) discharge. The value of ε T was determined from a power balance based on the electropositive global (volume-averaged) model. A floating harmonic method was employed to measure ion fluxes and electron temperatures at the discharge wall. In the pressure range 5-50 mTorr, it was found that the measured ε T ranged from about 70 to 150 V for atomic gases, but from about 180 to 1300 V for molecular gases. This difference between atomic and molecular discharge is caused by additional collisional energy losses of molecular gases. For argon discharge, the stepwise ionization effect on ε T was observed at relatively high pressures. For different gases, the measured ε T was evaluated with respect to the electron temperature, and then compared with the calculation results, which were derived from collisional and kinetic energy loss. The measured ε T and their calculations showed reasonable agreement.

Full Text Available The article considers the problem of professional training of students in e-learning environment in accordance with the principle of security. The authors offer the essay technology of multiple difficulty levels. In the article the description of each level of technology proves its conformity to the positions of principle of security. The main methods of measurement performance were made by expert assessment and subjective scaling. The analysis of results of approbation of essay technology of multiple difficulty levels in the experimental sample showed an increase of objective and subjective indicators. Positive methodological and personal effects of the introduction of technology into the process of university education were identified, corresponding to the positions of principle of security. Methodical recommendations of application of technology were formulated.

Precise monitoring of the incoming photon flux is crucial for many experiments using synchrotron radiation. For photon energies above a few keV, thin semiconductor photodiodes can be operated in transmission for this purpose. Diamond is a particularly attractive material as a result of its low absorption. The responsivity of a state-of-the art diamond quadrant transmission detector has been determined, with relative uncertainties below 1% by direct calibration against an electrical substitution radiometer. From these data and the measured transmittance, the thickness of the involved layers as well as the mean electron-hole pair creation energy were determined, the latter with an unprecedented relative uncertainty of 1%. The linearity and X-ray scattering properties of the device are also described.

The diatomic halogen atom-rare gas diatomic complexes KrBr-, XeBr-, and KrCl- are studied in this work by zero electron kinetic energy (ZEKE) spectroscopy in order to characterize the weak intermolecular diatomic potentials of these species. Also, the ZEKE and threshold photodetachment spectra of the polyatomic clusters ArnBr- (n = 2-9) and ArnI- (n = 2-19) are studied to obtain information about the non-additive effects on the interactions among the atoms. This work is part of an ongoing effort to characterize the pair and many-body potentials of the complete series of rare gas halide clusters. In these studies we obtain information about both the anionic and neutral clusters.

The electronic structure of β-Pb{sub 0.33}V{sub 2}O{sub 5} nanowires has been studied with x-ray photoelectron spectroscopy techniques. The recent synthesis of defect-free β-Pb{sub 0.33}V{sub 2}O{sub 5} nanowires resulted in the discovery of an abrupt voltage-induced metal insulator transition. First principle calculations predicted an additional V-O-Pb hybridized “in-gap” state unique to this vanadium bronze playing a significant role in facilitating the transition. We confirm the existence, energetic position, and orbital character of the “in-gap” state. Moreover, we reveal that this state is a hybridized Pb 6s–O 2p antibonding lone pair state resulting from the asymmetric coordination of the Pb{sup 2+} ions.

The authors have previously established that the direct /sup 13/C-/sup 13/C coupling constants are stereospecific relative to the orientation of unshared electronpairs (UEP) of nitrogen and oxygen atoms. Here they show that the nitrogen UEP produces a positive contribution to the direct /sup 13/C-/sup 13/C coupling constant of an adjacent syn-periplanar carbon-carbon bond and not to a negative contribution of the corresponding constant of the anti-periplanar bond. Thus, the observed effect is not a consequence of the interaction of the heteroatom UEP with the anti-bonding orbital of the adjacent anti-periplanar bond (n/sub o-o/* interaction) as in the case of anomeric and related effects.

We report a first-principles investigation of the structural, electronic and magnetic properties of cobalt–vacancy defect complexes in graphene, within the framework of density-functional theory (DFT), incorporating DFT+U. Specifically, we consider the interactions of cobalt and vacancies in graphene, at varying separations and sub-lattices. We show that it is energetically favorable for substitutional Co in graphene to trap an additional vacancy in graphene, forming a Co–vacancy complex. In all the configurations considered, the most stable configuration is when the Co atom is embedded in a divacancy. The magnetic moment induced on the cobalt atom varies as the vacancy–cobalt separation changes, depending not only on the separation, but also on the sub-lattice of the vacancy relative to cobalt. Furthermore, for each separation and sub-lattice considered, the linear density of states of graphene is modified such that Dirac point is either not discernible or has shifted above the Fermi energy. Since individual vacancies or transition metal (TM) atoms, such as cobalt in graphene, have mostly been studied in isolation up to now, ignoring possible transition metal–vacancy interactions, these results have important implications to the fundamental understanding of TM–vacancy defect interactions in graphene

Multi-reference (MR) electronic structure methods, such as MR configuration interaction or MR perturbation theory, can provide reliable energies and properties for many molecular phenomena like bond breaking, excited states, transition states or magnetic properties of transition metal complexes and clusters. However, owing to their inherent complexity, most MR methods are still too computationally expensive for large systems. Therefore the development of more computationally attractive MR approaches is necessary to enable routine application for large-scale chemical systems. Among the state-of-the-art MR methods, second-order N-electron valence state perturbation theory (NEVPT2) is an efficient, size-consistent, and intruder-state-free method. However, there are still two important bottlenecks in practical applications of NEVPT2 to large systems: (a) the high computational cost of NEVPT2 for large molecules, even with moderate active spaces and (b) the prohibitive cost for treating large active spaces. In this work, we address problem (a) by developing a linear scaling “partially contracted” NEVPT2 method. This development uses the idea of domain-based local pair natural orbitals (DLPNOs) to form a highly efficient algorithm. As shown previously in the framework of single-reference methods, the DLPNO concept leads to an enormous reduction in computational effort while at the same time providing high accuracy (approaching 99.9% of the correlation energy), robustness, and black-box character. In the DLPNO approach, the virtual space is spanned by pair natural orbitals that are expanded in terms of projected atomic orbitals in large orbital domains, while the inactive space is spanned by localized orbitals. The active orbitals are left untouched. Our implementation features a highly efficient “electronpair prescreening” that skips the negligible inactive pairs. The surviving pairs are treated using the partially contracted NEVPT2 formalism. A detailed

The guanine-cytosine (GC) radical anion and its interaction with a single water molecule is studied using ab initio and density functional methods. Z-averaged second-order perturbation theory (ZAPT2) was applied to GC radical anion for the first time. Predicted spin densities show that the radical character is localized on cytosine. The Watson-Crick monohydrated GC anion is compared to neutral GC·H2O, as well as to the proton-transferred analogue on the basis of structural and energetic properties. In all three systems, local minima are identified that correspond to water positioned in the major and minor grooves of macromolecular DNA. On the anionic surface, two novel structures have water positioned above or below the GC plane. On the neutral and anionic surfaces, the global minimum can be described as water interacting with the minor groove. These structures are predicted to have hydration energies of 9.7 and 11.8 kcal mol(-1), respectively. Upon interbase proton-transfer (PT), the anionic global minimum has water positioned in the major groove, and the hydration energy increases to 13.4 kcal mol(-1). PT GC·H2O(•-) has distonic character; the radical character resides on cytosine, while the negative charge is localized on guanine. The effects of proton transfer are further investigated through the computed adiabatic electron affinities (AEA) of GC and monohydrated GC, and the vertical detachment energies (VDE) of the corresponding anions. Monohydration increases the AEAs and VDEs by only 0.1 eV, while proton-transfer increases the VDEs substantially (0.8 eV). The molecular charge distribution of monohydrated guanine-cytosine radical anion depends heavily on interbase proton transfer.

ABBREVIATIONS ANSI American National Standards Institute ASIS American Society of Industrial Security CCTV Closed Circuit Television CONOPS...is globally recognized for the development and maintenance of standards. ASTM defines a specification as an explicit set of requirements...www.rkb.us/saver/. One of the SAVER reports titled CCTV Technology Handbook has a chapter on system design. The report uses terms like functional

Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

The contributions of scalar-leptoquark doublets to the cross sections σ QQ-tilde ' for the production of quark-antiquark pairs in electron-positron annihilation are calculated within the minimal model based on the four-color symmetry of quarks and leptons. These contributions are analyzed versus the scalar-leptoquark masses and the mixing parameters of the model at colliding-particle energies in the range 250-1000 GeV. It is shown that the contributions in question are of greatest importance for processes leading to t-quark production. In particular, it is found that, with allowance for the contribution of the scalar leptoquark of charge 5/3 and mass in the range 250-500 GeV, the cross section σ tt-tilde calculated at a mixing-parameter value of k t ∼ 1 may be severalfold larger than the corresponding cross section σ tt-tilde (SM) within the Standard Model. The possibility of setting constraints on the scalar-leptoquark masses and on the mixing parameters by measuring such contributions at future electron-positron colliders is indicated

External electric-field-induced change in fluorescence spectra as well as in fluorescence decay has been measured for electron donor and acceptor pairs of pyrene (PY) and N-methylphthalimide (NMPI) doped in a polymer film. Field-induced quenching and field-induced shortening of lifetime are observed for fluorescence emitted from the locally excited (LE) state of PY, indicating that intermolecular electron transfer from the excited state of PY to NMPI is enhanced by an electric field in a polymer film. A simulation has been made for the field effect on decay profile of the LE fluorescence of PY. Exciplex fluorescence is also quenched by an electric field because of the field-induced decrease in the initial population of the fluorescent exciplex. Both in LE fluorescence of PY and in exciplex fluorescence, electric-field-induced quenching becomes less efficient in the presence of a magnetic field. The mechanism of the synergy effect of electric and magnetic fields on fluorescence has been discussed.

External electric-field-induced change in fluorescence spectra as well as in fluorescence decay has been measured for electron donor and acceptor pairs of pyrene (PY) and N-methylphthalimide (NMPI) doped in a polymer film. Field-induced quenching and field-induced shortening of lifetime are observed for fluorescence emitted from the locally excited (LE) state of PY, indicating that intermolecular electron transfer from the excited state of PY to NMPI is enhanced by an electric field in a polymer film. A simulation has been made for the field effect on decay profile of the LE fluorescence of PY. Exciplex fluorescence is also quenched by an electric field because of the field-induced decrease in the initial population of the fluorescent exciplex. Both in LE fluorescence of PY and in exciplex fluorescence, electric-field-induced quenching becomes less efficient in the presence of a magnetic field. The mechanism of the synergy effect of electric and magnetic fields on fluorescence has been discussed

As clinical genetics evolves, and we embark down the path toward more personalized and effective health care, the amount, detail, and complexity of genetic/genomic test information within the electronic health record will increase. This information should be appropriately protected to secure the trust of patients and to support interoperable electronic health information exchange. This article discusses characteristics of genetic/genomic test information, including predictive capability, immutability, and uniqueness, which should be considered when developing policies about information protection. Issues related to "genetic exceptionalism"; i.e., whether genetic/genomic test information should be treated differently from other medical information for purposes of data access and permissible use, are also considered. These discussions can help guide policy that will facilitate the biological and clinical resource development to support the introduction of this information into health care.

E-Health systems are experiencing an impulse in these last years, when many medical agencies began to include digital solutions into their platforms. Electronic Health Records (EHRs) are one of the most important improvements, being in its most part a patient-oriented tool. To achieve a completely operational EHR platform, security and privacy problems have to be resolved, due to the importance of the data included within these records. But given all the different methods to address security and privacy, they still remain in most cases as an open issue. This paper studies existing and proposed solutions included in different scenarios, in order to offer an overview of the current state in EHR systems. Bibliographic material has been obtained mainly from MEDLINE and SCOPUS sources, and over 30 publications have been analyzed. Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy.

Photographs are important tools to record, track, and communicate clinical findings. Mobile devices with high-resolution cameras are now ubiquitous, giving clinicians the opportunity to capture and share images from the bedside. However, secure and efficient ways to manage and share digital images are lacking. The aim of this study is to describe the implementation of a secure application for capturing and storing clinical images in the electronic health record (EHR), and to describe initial user experiences. We developed CliniCam, a secure Apple iOS (iPhone, iPad) application that allows for user authentication, patient selection, image capture, image annotation, and storage of images as a Portable Document Format (PDF) file in the EHR. We leveraged our organization's enterprise service-oriented architecture to transmit the image file from CliniCam to our enterprise clinical data repository. There is no permanent storage of protected health information on the mobile device. CliniCam also required connection to our organization's secure WiFi network. Resident physicians from emergency medicine, internal medicine, and dermatology used CliniCam in clinical practice for one month. They were then asked to complete a survey on their experience. We analyzed the survey results using descriptive statistics. Twenty-eight physicians participated and 19/28 (68%) completed the survey. Of the respondents who used CliniCam, 89% found it useful or very useful for clinical practice and easy to use, and wanted to continue using the app. Respondents provided constructive feedback on location of the photos in the EHR, preferring to have photos embedded in (or linked to) clinical notes instead of storing them as separate PDFs within the EHR. Some users experienced difficulty with WiFi connectivity which was addressed by enhancing CliniCam to check for connectivity on launch. CliniCam was implemented successfully and found to be easy to use and useful for clinical practice. CliniCam is

With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

We evaluated the role of home monitoring, communication with pharmacists, medication intensification, medication adherence and lifestyle factors in contributing to the effectiveness of an intervention to improve blood pressure control in patients with uncontrolled essential hypertension. We performed a mediation analysis of a published randomized trial based on the Chronic Care Model delivered over a secure patient website from June 2005 to December 2007. Study arms analyzed included usual care with a home blood pressure monitor and usual care with home blood pressure monitor and web-based pharmacist care. Mediator measures included secure messaging and telephone encounters; home blood pressure monitoring; medications intensification and adherence and lifestyle factors. Overall fidelity to the Chronic Care Model was assessed with the Patient Assessment of Chronic Care (PACIC) instrument. The primary outcome was percent of participants with blood pressure (BP) <140/90 mm Hg. At 12 months follow-up, patients in the web-based pharmacist care group were more likely to have BP <140/90 mm Hg (55%) compared to patients in the group with home blood pressure monitors only (37%) (p = 0.001). Home blood pressure monitoring accounted for 30.3% of the intervention effect, secureelectronic messaging accounted for 96%, and medication intensification for 29.3%. Medication adherence and self-report of fruit and vegetable intake and weight change were not different between the two study groups. The PACIC score accounted for 22.0 % of the main intervention effect. The effect of web-based pharmacist care on improved blood pressure control was explained in part through a combination of home blood pressure monitoring, secure messaging, and antihypertensive medication intensification.

Thermodynamic and thermophysical properties of Na 2 SiO 3 in the Cmc2 1 structural state are computed ab initio using the hybrid B3LYP density functional method. The static properties at the athermal limit are first evaluated through a symmetry-preserving relaxation procedure. The thermodynamic properties that depend on vibrational frequencies, viz., heat capacities, thermal expansion, thermal derivative of the bulk modulus, thermal correction to internal energy, enthalpy, and Gibbs free energy, are then computed in the framework of quasi-harmonic approximation. Acoustic branches are computed by solving the Christoffel determinant and are assumed to follow sine wave dispersion when traveling within the Brillouin zone. The procedure generates several thermo-physical properties of interest in materials science and geophysics (transverse and longitudinal wave velocities, shear modulus, Young modulus, Poisson ratio) all consistent with experimentally determined properties. A representative cluster is then abstracted from the cell and a detailed electron localization/delocalization analysis is performed on it, in the ground state geometry, and on deformed states imposed by two peculiar mixed asymmetric stretching/bending modes affecting the silicate chain that, according to literature data, have anomalous mode Grüneisen parameters. A Bader analysis reveals an intriguing feature associated with these deformations: an increase in the covalence of the Si-O bond that strengthens the linkage opposing the weakening induced by thermal stress. Finally, on the same cluster, the Ramsey contributions to the J NM coupling are evaluated by the gauge-independent atomic orbital method. The calculated isotropic chemical shifts of both 23 Na and 29 Si are again in substantial agreement with observations.

.... Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity...

...). The purpose of this collaborative work was to facilitate the processing and the protection of distributed authentic electronic records archives (ERA) for the U.S. National Archives and Records Administration (NARA).

Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

Electron-positron pair production by collision of photons is investigated in view of application to pulsar physics. We compute the absorption rate of individual gamma-ray photons by an arbitrary anisotropic distribution of softer photons, and the energy and angular spectrum of the outgoing leptons. We work analytically within the approximation that 1 ≫ mc2/E > ɛ/E, with E and ɛ the gamma-ray and soft-photon maximum energy and mc2 the electron mass energy. We give results at leading order in these small parameters. For practical purposes, we provide expressions in the form of Laurent series which give correct reaction rates in the isotropic case within an average error of ˜ 7 per cent. We apply this formalism to gamma-rays flying downward or upward from a hot neutron star thermally radiating at a uniform temperature of 106 K. Other temperatures can be easily deduced using the relevant scaling laws. We find differences in absorption between these two extreme directions of almost two orders of magnitude, much larger than our error estimate. The magnetosphere appears completely opaque to downward gamma-rays while there are up to ˜ 10 per cent chances of absorbing an upward gamma-ray. We provide energy and angular spectra for both upward and downward gamma-rays. Energy spectra show a typical double peak, with larger separation at larger gamma-ray energies. Angular spectra are very narrow, with an opening angle ranging from 10-3 to 10-7 radians with increasing gamma-ray energies.

Complete text of publication follows. We discuss various approaches to problem of the electron-positron pair creation in the strong external field. Special interest presents the circuit, in which the interaction of two strong counterpropagating laser beams in vacuum is considered. For the calculation of the probability of the creation the following formula is usually applied: W = 2Im(L (E-H) (ρ L )) = 2m 4 /(2π) 3 ρ L 2 Σ n=1 -∞ 1/n 2 e -nπ /ρ L where ρ L = E L / E cr and E cr = m 2 /e = 1.3 x 10 16 V/cm is the Schwinger field limit. However this expression was obtained even in pioneer works dedicated to vacuum nonlinearity and it based on some approximations. Attempt of the strict analysis has been made in work by introducing the nonlocal form-factor into the Lagrangian. But, as it is well known, such procedure leads to the loss of Lorenz invariance or unitarity. We show that the formalism of generalized quantum dynamic (GQD) opens new opportunities to solve such problems. We show also how it can be made proceeding from nonlocal interaction operator obtained earlier within the framework of the formalism of GQD. Acknowledgements. This work was supported by the Grant of Federal Agency on Education, Russia (Contract number 02.740.11.0428) and by the Grant of Russian President No. NSh 2965.2008.2.

The argument which justifies the use of a pair potential to describe the structure-dependent term in the energy of liquid metals is briefly reviewed. Because there is an additional term in the energy which depends upon volume rather than structure, and because the pair potential itself is volume-dependent, the relationship between pair potential and observable properties such as pressure, bulk modulus and pair distribution function is more complicated for liquid metals than it is for molecular liquids. Perhaps for this reason, the agreement between pair potentials inferred from observable properties and pair potentials calculated by means of pseudo-potential theory is still far from complete. The pair potential concept is applicable only to simple liquid metals, in which the electron-ion interaction is weak. No attempt is made to discuss liquid transition and rare-earth metals, which are not simple in this sense. (author)

Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. SecureElectronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

Highlights: • Junctionless Cooper pair box. • Quantum phase slips. • Coulomb blockade and gate modulation of the Coulomb gap. - Abstract: Quantum phase slip (QPS) is the topological singularity of the complex order parameter of a quasi-one-dimensional superconductor: momentary zeroing of the modulus and simultaneous 'slip' of the phase by ±2π. The QPS event(s) are the dynamic equivalent of tunneling through a conventional Josephson junction containing static in space and time weak link(s). Here we demonstrate the operation of a superconducting single electron transistor (Cooper pair transistor) without any tunnel junctions. Instead a pair of thin superconducting titanium wires in QPS regime was used. The current–voltage characteristics demonstrate the clear Coulomb blockade with magnitude of the Coulomb gap modulated by the gate potential. The Coulomb blockade disappears above the critical temperature, and at low temperatures can be suppressed by strong magnetic field.

Image guided radiation therapy solutions based on megavoltage computed tomography (MVCT) involve the extension of electronic portal imaging devices (EPIDs) from their traditional role of weekly localization imaging and planar dose mapping to volumetric imaging for 3D setup and dose verification. To sustain the potential advantages of MVCT, EPIDs are required to provide improved levels of portal image quality. Therefore, it is vital that the performance of EPIDs in clinical use is maintained at an optimal level through regular and rigorous quality assurance (QA). Traditionally, portal imaging QA has been carried out by imaging calibrated line-pair and contrast resolution phantoms and obtaining arbitrarily defined QA indices that are usually dependent on imaging conditions and merely indicate relative trends in imaging performance. They are not adequately sensitive to all aspects of image quality unlike fundamental imaging metrics such as the modulation transfer function (MTF), noise power spectrum (NPS), and detective quantum efficiency (DQE) that are widely used to characterize detector performance in radiographic imaging and would be ideal for QA purposes. However, due to the difficulty of performing conventional MTF measurements, they have not been used for routine clinical QA. The authors present a simple and quick QA methodology based on obtaining the MTF, NPS, and DQE of a megavoltage imager by imaging standard open fields and a bar-pattern QA phantom containing 2 mm thick tungsten line-pair bar resolution targets. Our bar-pattern based MTF measurement features a novel zero-frequency normalization scheme that eliminates normalization errors typically associated with traditional bar-pattern measurements at megavoltage x-ray energies. The bar-pattern QA phantom and open-field images are used in conjunction with an automated image analysis algorithm that quickly computes the MTF, NPS, and DQE of an EPID system. Our approach combines the fundamental advantages of

Using the photo-voltaic effect in p-n junctions, we have studied, during bombardment, the mechanism of the recombination of 'electron-hole' pairs in the presence of structure defects produced in germanium of the N and P types by {gamma} rays from a Co{sup 60} source. At 310 K the level of the recombination centres is situated 0.25 eV above the conduction band and the capture cross-sections of the holes and of the electrons have the respective values of: {sigma}{sub p} = 4 X 10{sup -15} cm{sup 2} and {sigma}{sub n} = 3 X 10{sup -15} cm{sup 2}. The value of {sigma}{sub n} appears to be under-estimated because the number of defects in P-type samples appears to be lower than that in N-type samples. These results lead to the conclusion that the interstitials are responsible for the recombination. At 80 K it has been found that in N-type samples, a shallow level exists at O.05 eV below the conduction band with a capture cross-section for the holes of {sigma}{sub p} {>=} 10{sup -14} cm{sup 2}. We believe that in this case the recombination of charge carriers is controlled by the neighbouring 'defect-interstitial' pairs. In P-type samples at low temperature, the life-time is practically constant during irradiation. This fact is attributed to a spontaneous annealing of defects ol purely electrical origin. In the last part of the work the study of the photo-voltaic effect applied to the problem of gamma radiation dosimetry is considered. It is shown that such dosimeters, based on this principle, make it possible to measure the intensity of gamma rays over a very wide range. (author) [French] En utilisant l'effet photovoltaique dans les jonctions p-n, nous avons etudie au cours du bombardement le mecanisme de recombinaison des paires 'electron-trou' en presence des defauts de structure introduits dans le germanium de type N et de type P par les rayons gamma d'une source de Co{sup 60}. A 310 K, le niveau des centres de recombinaison se trouve a 0,25 eV au-dessous de la bande

Full Text Available Ultra strong electromagnetic fields can lead to spontaneous creation of single or multiple electron–positron pairs. A quantum field theoretical treatment of the pair creation process combined with numerical methods provides a description of the fermionic quantum field state, from which all observables of the multiple electron–positron pairs can be inferred. This allows to study the complex multi-particle dynamics of electron–positron pair creation in-depth, including multi-pair statistics as well as momentum distributions and spin. To illustrate the potential benefit of this approach, it is applied to the intermediate regime of pair creation between nonperturbative Schwinger pair creation and perturbative multiphoton pair creation where the creation of multi-pair states becomes nonnegligible but cascades do not yet set in. Furthermore, it is demonstrated how spin and helicity of the created electrons and positrons are affected by the polarization of the counterpropagating laser fields, which induce the creation of electron–positron pairs.

Orbital-optimized coupled-electronpair theory [or simply "optimized CEPA(0)," OCEPA(0), for short] and its analytic energy gradients are presented. For variational optimization of the molecular orbitals for the OCEPA(0) method, a Lagrangian-based approach is used along with an orbital direct inversion of the iterative subspace algorithm. The cost of the method is comparable to that of CCSD [O(N6) scaling] for energy computations. However, for analytic gradient computations the OCEPA(0) method is only half as expensive as CCSD since there is no need to solve the λ2-amplitude equation for OCEPA(0). The performance of the OCEPA(0) method is compared with that of the canonical MP2, CEPA(0), CCSD, and CCSD(T) methods, for equilibrium geometries, harmonic vibrational frequencies, and hydrogen transfer reactions between radicals. For bond lengths of both closed and open-shell molecules, the OCEPA(0) method improves upon CEPA(0) and CCSD by 25%-43% and 38%-53%, respectively, with Dunning's cc-pCVQZ basis set. Especially for the open-shell test set, the performance of OCEPA(0) is comparable with that of CCSD(T) (ΔR is 0.0003 Å on average). For harmonic vibrational frequencies of closed-shell molecules, the OCEPA(0) method again outperforms CEPA(0) and CCSD by 33%-79% and 53%-79%, respectively. For harmonic vibrational frequencies of open-shell molecules, the mean absolute error (MAE) of the OCEPA(0) method (39 cm-1) is fortuitously even better than that of CCSD(T) (50 cm-1), while the MAEs of CEPA(0) (184 cm-1) and CCSD (84 cm-1) are considerably higher. For complete basis set estimates of hydrogen transfer reaction energies, the OCEPA(0) method again exhibits a substantially better performance than CEPA(0), providing a mean absolute error of 0.7 kcal mol-1, which is more than 6 times lower than that of CEPA(0) (4.6 kcal mol-1), and comparing to MP2 (7.7 kcal mol-1) there is a more than 10-fold reduction in errors. Whereas the MAE for the CCSD method is only 0.1 kcal

The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

Conventional Cooper pairs form from well-defined electronic quasiparticles, making the internal structure of the pair irrelevant. However, in the 115 family of superconductors, the heavy electrons are forming as they pair and the internal pair structure becomes as important as the pairing mechanism. Conventional spin fluctuation mediated pairing cannot capture the direct transition from incoherent local moments to heavy fermion superconductivity, but the formation of composite pairs favored by the two channel Kondo effect can. These composite pairs are local d-wave pairs formed by two conduction electrons in orthogonal Kondo channels screening the same local moment. Composite pairing shares the same symmetries as magnetically mediated pairing, however, only composite pairing necessarily involves a redistribution of charge within the unit cell originating from the internal pair structure, both as a monopole (valence change) and a quadrupole effect. This redistribution will onset sharply at the superconducting transition temperature. A smoking gun test for composite pairing is therefore a sharp signature at Tc - for example, a cusp in the Mossbauer isomer shift in NpPd5Al2 or in the NQR shift in (Ce,Pu)CoIn5.

The HADES-spectrometer at GSI is used to measure the production of the light vector mesons {rho}, {omega} and {phi} at SIS energies. Therefore, the medium sized collision system Ar+KCl was measured at 1.76 AGeV kinetic energy of beam particles. In this system the density of particle tracks is much larger as compared to the formerly used collision system C+C, making it necessary to upgrade the data analysis. The previous method of hard-cuts - used for particle identification - was replaced by a newly developed multi-variate analysis based on an artificial neural network. This algorithm has the benefit, that it is more robust against fluctuations in one or more of the used detector observables. This increases the overall efficiency and purity of the analysis procedure. Furthermore, the reconstruction of particle tracks inside the HADES spectrometer is based on a few position information, only. During analysis of raw data, these information are combined to a artificially large manifold of tracks. This leads to the general problem that one has to select the maximum number of true physical tracks out of this set of tracks per event. A new method of track selection is used to filter the data not only to select single tracks, but also to identify electronpairs created during Dalitz-decay of {pi}{sup 0} mesons, which build the bulk of combinatorial background. The result of the analysis is an efficiency corrected invariant mass spectrum of electronpairs, normalized to the mean number of pions per event. The spectrum consists of more than 16,000 pairs with an invariant mass larger than 150 MeV. In total more than 150000 pairs were found. A first comparison with the spectra calculated by using the old analysis approach shows a 30% enhancement in yield of reconstructed electronpairs. A first comparison with a simple thermal model implemented by the Pluto event generator, opens the possibility to compare the measured pair yield of {omega} and {phi} mesons via m{sub T

Electron-positron pair production in strong Coulomb fields is outlined. It is shown that the singular behaviour of the adiabatic basis can be removed if solutions of the time dependent external field Dirac equation are used as a basis to expand the fermion field operator. This latter 'asymptotic basis' makes it possible to introduce Feynman-propagator. Applying the reduction technique, the computation of all of the basic quantities can be reduced to the solution of an integral equation. The positron spectrum for separable potential model with Lorentzian time dependence and for potential jump is analyzed in the pole approximation. (author)

Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong

Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use

We present a measurement of ee pair production in central PbAu collisions at 158A GeV/c. As reported earlier, a significant excess of the ee pair yield over the expectation from hadron decays is observed. The improved mass resolution of the present data set, recorded with the upgraded CERES experiment at the CERN-SPS, allows for a comparison of the data with different theoretical approaches. The data clearly favor a substantial in-medium broadening of the ρ spectral function over a density-dependent shift of the ρ pole mass. The in-medium broadening model implies that baryon induced interactions are the key mechanism to the observed modifications of the ρ meson at SPS energy.

We present a measurement of e+e- pair production in central Pbsbnd Au collisions at 158 A GeV / c. As reported earlier, a significant excess of the e+e- pair yield over the expectation from hadron decays is observed. The improved mass resolution of the present data set, recorded with the upgraded CERES experiment at the CERN-SPS, allows for a comparison of the data with different theoretical approaches. The data clearly favor a substantial in-medium broadening of the ρ spectral function over a density-dependent shift of the ρ pole mass. The in-medium broadening model implies that baryon induced interactions are the key mechanism to the observed modifications of the ρ meson at SPS energy.

We present a measurement of $e^+e^-$ pair production in central Pb-Au collisions at 158$A$ GeV/$c$. As reported earlier, a significant excess of the $e^+e^-$ pair yield over the expectation from hadron decays is observed. The improved mass resolution of the present data set, recorded with the upgraded CERES experiment at the CERN-SPS, allows for a comparison of the data with different theoretical approaches. The data clearly favor a substantial in-medium broadening of the $\\rho$ spectral function over a density-dependent shift of the $\\rho$ pole mass at SPS energy. The in-medium broadening model implies that baryon induced interactions are the key mechanism to in-medium modifications of the $\\rho$-meson in the hot fireball.

Cellular respiration is a catabolic pathway for producing adenosine triphosphate (ATP) and is the most efficient process through which cells harvest energy from consumed food. When cells undergo cellular respiration, they require a pathway to keep and transfer electrons (i.e., the electron transport chain). Due to oxidation-reduction reactions, the electron transport chain produces a transmembrane proton electrochemical gradient. In case protons flow back through this membrane, this mechanical energy is converted into chemical energy by ATP synthase. The convert process is involved in producing ATP which provides energy in a lot of cellular processes. In the electron transport chain process, flavin adenine dinucleotide (FAD) is one of the most vital molecules for carrying and transferring electrons. Therefore, predicting FAD binding sites in the electron transport chain is vital for helping biologists understand the electron transport chain process and energy production in cells. We used an independent data set to evaluate the performance of the proposed method, which had an accuracy of 69.84 %. We compared the performance of the proposed method in analyzing two newly discovered electron transport protein sequences with that of the general FAD binding predictor presented by Mishra and Raghava and determined that the accuracy of the proposed method improved by 9-45 % and its Matthew's correlation coefficient was 0.14-0.5. Furthermore, the proposed method enabled reducing the number of false positives significantly and can provide useful information for biologists. We developed a method that is based on PSSM profiles and SAAPs for identifying FAD binding sites in newly discovered electron transport protein sequences. This approach achieved a significant improvement after we added SAAPs to PSSM features to analyze FAD binding proteins in the electron transport chain. The proposed method can serve as an effective tool for predicting FAD binding sites in electron

By numerically solving the relativistic Boltzmann equations, we compute the time scale for relaxation to thermal equilibrium for an optically thick electron-positron plasma with baryon loading. We focus on the time scales of electromagnetic interactions. The collisional integrals are obtained directly from the corresponding QED matrix elements. Thermalization time scales are computed for a wide range of values of both the total-energy density (over 10 orders of magnitude) and of the baryonic loading parameter (over 6 orders of magnitude). This also allows us to study such interesting limiting cases as the almost purely electron-positron plasma or electron-proton plasma as well as intermediate cases. These results appear to be important both for laboratory experiments aimed at generating optically thick pair plasmas as well as for astrophysical models in which electron-positron pair plasmas play a relevant role.

The study of electronically excited van der Waals (vdW) systems presents a challenge for the theory of intermolecular interactions, and here we show how far ab initio computations can go. We found that the interaction energies for such electronically excited systems can indeed be determined, providing a reliable and accurate description for the E state potential of the HeI 2 , that in combination with the ground X and electronic excited B state of the complex, is useful to model experimental data related with potential minima and also predict higher vibrational vdW states

The authors present a measurement of the mass dependence of the forward-backward charge asymmetry for e+e-pairs resulting from γ*/Z decays with mass Mee > 40 GeV/c2. The Run II data sample consists of 72 pb-1 of data, which was collected by the CDF detector in $\\bar{p}$p collisions at √s = 1.96 TeV at the Fermilab Tevatron. The measurement is compared with predictions from the Standard Model.

Electronic Health Record systems (EHRs) offer numerous benefits in health care but also pose certain risks. As we progress toward the implementation of EHRs, a more in-depth understanding of attitudes that influence overall levels of EHR support is required. To record public and physicians' awareness, expectations for, and ethical concerns about the use of EHRs. A convenience sample was surveyed for both the public and physicians. The Public's Questionnaire was distributed to the public in a printed and an online version. The Physicians' Questionnaire was distributed to physicians in an online version. The questionnaires requested demographic characteristics followed by close-ended questions enquiring about awareness, perceived impact, perceived risks, and ethical issues raised by EHR use. In total, 46% of the public and 91% of physicians were aware of EHRs. Physicians' and public opinions were comparable concerning the positive impact of EHRs on better, more effective, and faster decisions on the patients' health, on better coordination between hospitals/clinics and on quality and reduced cost of health care. However, physicians were concerned that an EHR system would be a burden for their finances, for their time concerning training on the system, for their everyday workload and workflow. The majority of the public generally agreed that they would worry about the possibility that a non-authorized, third party might gain access to their personal health information (48.8%), and that they would worry about future discriminations due to possible disclosure of their health information (48.8%). Most physicians disagreed that EHRs will disrupt the doctor-patient relationship (58.1%) but they would worry about the safety of their patients' information (53.1%). Overall, both the public and physicians were in favor of the implementation of an EHR system, evaluating that possible benefits are more important than possible risks. The majority of the public believed that

We study the ground state of a Hamiltonian introduced by Kolb and Penson for modelling situations in which small electronpairs are formed. The Hamiltonian consists of a tight binding band term, and a term describing the nearest neighbour hopping of electronpairs. We give a Gutzwiller-type variational treatment, first with a single-parameter Ansatz treated in the single site Gutzwiller approximation, and then with more complicated trial wave functions, and an improved Gutzwiller approximation. The calculation yields a transition from a partially paired normal state, in which the spin susceptibility has a diminished value, into a fully paired state. (author). 16 refs, 2 figs

The electron-transfer photochemistry of the covalent derivatives of the dye eosin, in which the xanthene dye is covalently attached to the amino acid L-tryptophan via the thiohydantoin derivative, the tryptophan dipeptide, and an ethyl ester derivative, has been investigated. The singlet excited state of the dye is significantly quenched on attachment of the aromatic amino acid residue. Dye triplet states are also intercepted through intramolecular interaction of excited dye and amino acid pendants. Flash photolysis experiments verify that this interaction involves electron transfer from the indole side chains of tryptophan. Rate constants for electron transfer are discussed in terms of the distance relationships for the eosin chromophore and aromatic redox sites on peptide derivatives, the pathway for [sigma]-[pi] through-bond interaction between redox sites, and the multiplicity and state of protonation for electron-transfer intermediates. Selected electron-transfer photoreactions were studied under conditions of binding of the peptide derivatives in a high molecular weight, water-soluble, globular polymer, poly(vinyl-2-pyrrolidinone). 28 refs., 4 figs., 1 tab.

Domain based local pair natural orbital coupled cluster theory with single-, double-, and perturbative triple excitations (DLPNO-CCSD(T)) is a highly efficient local correlation method. It is known to be accurate and robust and can be used in a black box fashion in order to obtain coupled cluster quality total energies for large molecules with several hundred atoms. While previous implementations showed near linear scaling up to a few hundred atoms, several nonlinear scaling steps limited the applicability of the method for very large systems. In this work, these limitations are overcome and a linear scaling DLPNO-CCSD(T) method for closed shell systems is reported. The new implementation is based on the concept of sparse maps that was introduced in Part I of this series [P. Pinski, C. Riplinger, E. F. Valeev, and F. Neese, J. Chem. Phys. 143, 034108 (2015)]. Using the sparse map infrastructure, all essential computational steps (integral transformation and storage, initial guess, pair natural orbital construction, amplitude iterations, triples correction) are achieved in a linear scaling fashion. In addition, a number of additional algorithmic improvements are reported that lead to significant speedups of the method. The new, linear-scaling DLPNO-CCSD(T) implementation typically is 7 times faster than the previous implementation and consumes 4 times less disk space for large three-dimensional systems. For linear systems, the performance gains and memory savings are substantially larger. Calculations with more than 20 000 basis functions and 1000 atoms are reported in this work. In all cases, the time required for the coupled cluster step is comparable to or lower than for the preceding Hartree-Fock calculation, even if this is carried out with the efficient resolution-of-the-identity and chain-of-spheres approximations. The new implementation even reduces the error in absolute correlation energies by about a factor of two, compared to the already accurate

GlobalUBid.com is a B2B (business-to-business) e-commerce company offering excess and obsolete inventory to online customers. GlobalUBid is rapidly expanding into the global online marketplace; but recently, its Web site crashed due to a denial-of-service (DOS) attack. A lack of security awareness at an organizational level has left GlobalUBidâ€™s online system vulnerable to internal and external attacks. Though informal security policies are in place, many employees are not aware of them nor...

Photosystem II (PSII) and ribonucleotide reductase employ oxidation and reduction of the tyrosine aromatic ring in radical transport pathways. Tyrosine-based reactions involve either proton-coupled electron transfer (PCET) or electron transfer (ET) alone, depending on the pH and the pKa of tyrosine's phenolic oxygen. In PSII, a subset of the PCET reactions are mediated by a tyrosine-histidine redox-driven proton relay, YD-His189. Peptide A is a PSII-inspired β-hairpin, which contains a single tyrosine (Y5) and histidine (H14). Previous electrochemical characterization indicated that Peptide A conducts a net PCET reaction between Y5 and H14, which have a cross-strand π-π interaction. The kinetic impact of H14 has not yet been explored. Here, we address this question through time-resolved absorption spectroscopy and 280-nm photolysis, which generates a neutral tyrosyl radical. The formation and decay of the neutral tyrosyl radical at 410 nm were monitored in Peptide A and its variant, Peptide C, in which H14 is replaced by cyclohexylalanine (Cha14). Significantly, both electron transfer (ET, pL 11, L = lyonium) and PCET (pL 9) were accelerated in Peptide A and C, compared to model tyrosinate or tyrosine at the same pL. Increased electronic coupling, mediated by the peptide backbone, can account for this rate acceleration. Deuterium exchange gave no significant solvent isotope effect in the peptides. At pL 9, but not at pL 11, the reaction rate decreased when H14 was mutated to Cha14. This decrease in rate is attributed to an increase in reorganization energy in the Cha14 mutant. The Y5-H14 mechanism in Peptide A is reminiscent of proton- and electron-transfer events involving YD-H189 in PSII. These results document a mechanism by which proton donors and acceptors can regulate the rate of PCET reactions.

The "all-particle" cosmic ray energy spectrum appears to be exhibiting a significant change in the spectral index just above approximately 3000 TeV. This could indicate (1) a change in the propagation of the cosmic rays in the galactic medium, and/or (2) the upper limit of the supernova shock wave acceleration mechanism, and/or (3) a new source of high-energy cosmic rays. Air shower and JACEE data indicate the spectral change is associated with a composition change to a heavier element mixture whereas DICE does not indicate this. A detector concept will be presented that utilizes the energy dependence of the production of direct Coulomb electron-positron pairs by energetic heavy ions. Monte Carlo simulations of a direct electronpair detector consisting of Pb target foils interleaved with planes of 1-mm square scintillating optical fibers will be discussed. The goal is to design a large area, non-saturating instrument to measure the energy spectrum of the individual cosmic ray elements in the "VH-group" for energies greater than 10 TeV/nucleon.

Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated

We report fixed-node diffusion Monte Carlo (DMC) calculations of stacking interaction energy between two adenine(A)-thymine(T) base pairs in B-DNA (AA:TT), for which reference data are available, obtained from a complete basis set estimate of CCSD(T) (coupled-cluster with singles, doubles, and perturbative triples). We consider four sets of nodal surfaces obtained from self-consistent field calculations and examine how the different nodal surfaces affect the DMC potential energy curves of the AA:TT molecule and the resulting stacking energies. We find that the DMC potential energy curves using the different nodes look similar to each other as a whole. We also benchmark the performance of various quantum chemistry methods, including Hartree-Fock (HF) theory, second-order Møller-Plesset perturbation theory (MP2), and density functional theory (DFT). The DMC and recently developed DFT results of the stacking energy reasonably agree with the reference, while the HF, MP2, and conventional DFT methods give unsatisfactory results.

The production of electron-positron pairs by photons in the Coulomb Field of electrons and positrons (triplet production) in hot thermal plasmas is investigated. The pair production rate for this process is calculated as a function of the photon energy and compared with the rate of photon-nucleus pair production for semi-relativistic and relativistic plasma temperatures. (author)

This talk will reprise a personal journey by the speaker in industrial and applied physics, commencing with his employment by IBM at age 17 in the early 1950s, and continuing through his corporate sponsored undergraduate and graduate years at Clarkson and Harvard Universities, resulting in 1965 in a doctorate in applied physics from the latter. He was subsequently assigned by IBM to its research division in San Jose (now Almaden), where he initially carried out both pure and applied theoretical and experimental investigations encompassing a broad range of company-related product technologies...storage, display, printer and data acquisition hardware and software. In 1973, he undertook performing DFT and quantum Monte Carlo calculations in support of group research in the then emerging field of organic and polymer superconductors, a very esoteric pursuit at the time. Following upon several corporate staff assignments involving various product development and sales strategies, in 1982 he was appointed manager of the cooperative phenomena group in the Almaden Research Center, which beginning in early 1987, made significant contributions to both the basic science and applications of high temperature superconductivity (HTSC). In 1993, after a 40-year career, he retired from IBM to accept a Science Fellow position at the Electric Power Research Institute (EPRI) where he funded power application development of superconductivity. In 2004, he retired from his EPRI career to undertake ``due diligence'' consulting services in support of the venture capital community in Silicon Valley. As a ``hobby,'' he currently pursues and publishes DFT studies in hope of discovering the pairing mechanism of HTSC. In summary, the speaker's career in industrial and applied physics demonstrates one can combine publishing a record three PRLs in one month with crawling around underground in substations with utility lineman helping install superconducting cables, along the way publishing 10

The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)

Full Text Available The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet

The authors present the results of a search for W{prime} boson decaying to electron-neutrino pairs in p{bar p} collisions at a center-of-mass energy of 1.96 TeV, using a data sample corresponding to 205 pb{sup -1} of integrated luminosity collected by the CDF II detector at Fermilab. They observe no evidence for this decay mode and set limits on the production cross section times branching fraction, assuming the neutrinos from W{prime} boson decays to be light. If they assume the manifest left-right symmetric model, they exclude a W{prime} boson with mass less than 788 GeV/c{sup 2} at the 95% confidence level.

The top quark has been discovered in 1995 by CDF and D0 collaborations in proton-antiproton collisions at the Tevatron. The amount of data recorded by both experiments makes it possible to accurately measure the properties of this very massive quark. This thesis is devoted to the measurement of the top pair production cross-section via the strong interaction, in a final state composed of two electrons, two particle jets and missing transverse energy. It is based on a 1 fb-1 data set collected by the D0 experiment between 2002 and 2006. The reconstruction and identification of electrons and jets is of major importance in this analysis, and have been studied in events where a Z boson is produced together with one or more jets. The Z+jets process is indeed the dominant physics background to top pair production in the dielectron final state. The primary goal of this cross-section measurement is to verify Standard Model predictions. In this document, this result is also interpreted to indirectly extract the top quark mass. Moreover, the cross-section measurement is sensitive to new physics such as the existence of a charged Higgs boson. The selection established for the cross-section analysis has been used to search for a H+ boson lighter than the top quark, where the latter can decay into a W+ or H+ boson and a b quark. The model that has been studied makes the assumption that the H+ boson can only decay into a tau lepton and a neutrino.

In this work, a systematic infrastructure is described that formalizes concepts implicit in previous work and greatly simplifies computer implementation of reduced-scaling electronic structure methods. The key concept is sparse representation of tensors using chains of sparse maps between two index sets. Sparse map representation can be viewed as a generalization of compressed sparse row, a common representation of a sparse matrix, to tensor data. By combining few elementary operations on sparse maps (inversion, chaining, intersection, etc.), complex algorithms can be developed, illustrated here by a linear-scaling transformation of three-center Coulomb integrals based on our compact code library that implements sparse maps and operations on them. The sparsity of the three-center integrals arises from spatial locality of the basis functions and domain density fitting approximation. A novel feature of our approach is the use of differential overlap integrals computed in linear-scaling fashion for screening products of basis functions. Finally, a robust linear scaling domain based local pair natural orbital second-order Möller-Plesset (DLPNO-MP2) method is described based on the sparse map infrastructure that only depends on a minimal number of cutoff parameters that can be systematically tightened to approach 100% of the canonical MP2 correlation energy. With default truncation thresholds, DLPNO-MP2 recovers more than 99.9% of the canonical resolution of the identity MP2 (RI-MP2) energy while still showing a very early crossover with respect to the computational effort. Based on extensive benchmark calculations, relative energies are reproduced with an error of typically <0.2 kcal/mol. The efficiency of the local MP2 (LMP2) method can be drastically improved by carrying out the LMP2 iterations in a basis of pair natural orbitals. While the present work focuses on local electron correlation, it is of much broader applicability to computation with sparse tensors in

This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

Based on the Bardeen Cooper Schrieffer (BCS) theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the produced photon pairs can be used to violate a Bell inequality, unambiguo...

The LHC produced proton-proton collision data with 7 TeV of center of mass energy corresponding to an integrated luminosity of 40 pb -1 in 2010 and of 5 fb -1 in 2011. The data collected by ATLAS have led to the validation the understanding of the detector, to the evaluation of its performance and to many measurements of physical quantities. In this context the top quark is a privileged field of study for TeV scale physics as well as for performance studies. After a reminder of the phenomenology of the standard model the first part of this thesis is devoted to the description of the detector and in particular of the liquid argon calorimeters for which the influence of the variations of the high voltage values is detailed. The second part is focused on studies about the reconstruction and the identification of electrons conducted on simulated data, but also on 2010 collision data thanks to J/ψ → e + e - events with the tag-and-probe method. The last part is devoted to top quark studies. A description of the signal and background simulated data for tt-bar events is given, as are the reconstruction and identification procedures of the objects present in the final state. The estimation of the contribution of events with a mis-identified lepton thanks to the matrix-method is then presented before the measurement of the tt-bar cross-section in dilepton channels made on 2011 data: the value of 178.8 ±2.3 (stat) +8. 9 -8. 4 (sys) +8.0 -7.4 (lumi) pb obtained by combining the three channels is compatible with theoretical predictions. (author) [fr

The LHC produced proton-proton collision data with 7 TeV of center of mass energy corresponding to an integrated luminosity of 40 pb -1 in 2010 and of 5 fb -1 in 2011. The data collected by ATLAS have led to the validation of the understanding of the detector, to the evaluation of its performance and to many measurements of physical quantities. In this context the top quark is a privileged field of study for TeV scale physics as well as for performance studies. After a reminder of the phenomenology of the standard model the first part of this thesis is devoted to the description of the detector and in particular of the liquid argon calorimeters for which the influence of the variations of the high voltage values is detailed. The second part is focused on studies about the reconstruction and the identification of electrons conducted on simulated data, but also on 2010 collision data thanks to J/ψ → e + e - events with the tag-and-probe method. The last part is devoted to top quark studies. A description of the signal and background simulated data for tt-bar events is given, as are the reconstruction and identification procedures of the objects present in the final state. The estimation of the contribution of events with a mis-identified lepton thanks to the matrix-method is then presented before the measurement of the tt-bar cross-section in dilepton channels made on 2011 data: the value of [178.8 ± 2.3 (stat) +8.9-8.4 (syst) +8.0-7.4 (lumi)] pb obtained by combining the three channels is compatible with theoretical predictions. (author)

We have used multiple solution state techniques and crystallographic analysis to investigate the importance of a putative transient interaction formed between Arg-alpha237 in electron transferring flavoprotein (ETF) and Tyr-442 in trimethylamine dehydrogenase (TMADH) in complex assembly, electron transfer, and structural imprinting of ETF by TMADH. We have isolated four mutant forms of ETF altered in the identity of the residue at position 237 (alphaR237A, alphaR237K, alphaR237C, and alphaR237E) and with each form studied electron transfer from TMADH to ETF, investigated the reduction potentials of the bound ETF cofactor, and analyzed complex formation. We show that mutation of Arg-alpha237 substantially destabilizes the semiquinone couple of the bound FAD and impedes electron transfer from TMADH to ETF. Crystallographic structures of the mutant ETF proteins indicate that mutation does not perturb the overall structure of ETF, but leads to disruption of an electrostatic network at an ETF domain boundary that likely affects the dynamic properties of ETF in the crystal and in solution. We show that Arg-alpha237 is required for TMADH to structurally imprint the as-purified semiquinone form of wild-type ETF and that the ability of TMADH to facilitate this structural reorganization is lost following (i) redox cycling of ETF, or simple conversion to the oxidized form, and (ii) mutagenesis of Arg-alpha237. We discuss this result in light of recent apparent conflict in the literature relating to the structural imprinting of wild-type ETF. Our studies support a mechanism of electron transfer by conformational sampling as advanced from our previous analysis of the crystal structure of the TMADH-2ETF complex [Leys, D. , Basran, J. , Sutcliffe, M. J., and Scrutton, N. S. (2003) Nature Struct. Biol. 10, 219-225] and point to a key role for the Tyr-442 (TMADH) and Arg-alpha237 (ETF) residue pair in transiently stabilizing productive electron transfer configurations. Our work

What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

Electric-field-induced change in fluorescence decay has been measured for electron donor and acceptor pairs of N-ethylcarbazole (ECZ) and dimethyl terephthalate (DMTP) doped in a polymer film. Field-induced change in lifetime of the fluorescence emitted from the locally excited state of ECZ clearly shows that the electron transfer from the excited state of ECZ to DMTP is enhanced by an external electric field ( F ). A comparison is made between the experimental results of the field effect on decay profile of the ECZ fluorescence and the simulated results. Time-resolved electrofluorescence spectra as well as the field-induced change in decay profile of exciplex fluorescence show that exciplex fluorescence is quenched by F at the early stage of time following photoexcitation, but enhanced by F at a later stage of time. Both the decrease in the initial population of the fluorescent exciplex and the lengthening of the exciplex fluorescence in lifetime are shown to be induced by F

Electric-field-induced change in fluorescence decay has been measured for electron donor and acceptor pairs of N-ethylcarbazole (ECZ) and dimethyl terephthalate (DMTP) doped in a polymer film. Field-induced change in lifetime of the fluorescence emitted from the locally excited state of ECZ clearly shows that the electron transfer from the excited state of ECZ to DMTP is enhanced by an external electric field ( F ). A comparison is made between the experimental results of the field effect on decay profile of the ECZ fluorescence and the simulated results. Time-resolved electrofluorescence spectra as well as the field-induced change in decay profile of exciplex fluorescence show that exciplex fluorescence is quenched by F at the early stage of time following photoexcitation, but enhanced by F at a later stage of time. Both the decrease in the initial population of the fluorescent exciplex and the lengthening of the exciplex fluorescence in lifetime are shown to be induced by F.

Over the past decade electronicsecurity technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

Pairings on elliptic curves are being used in an increasing number of cryptographic applications on many different devices and platforms, but few performance numbers for cryptographic pairings have been reported on embedded and mobile devices. In this paper we give performance numbers for affine and

Except for the closed shell nuclei, almost all nuclei are in the superconducting state at their ground states. This well-known pair correlation in nuclei causes various interesting phenomena. It is especially to be noted that the pair correlation becomes weak in the excited states of nuclei with high angular momentum, which leads to the pair phase transition to the normal state in the high spin limit. On the other hand, the pair correlation becomes stronger in the nuclei with lower nucleon density than in those with normal density. In the region of neutron halo or skin state of unstable nuclei, this phenomenon is expected to be further enhanced to be observed compared to the ground state of stable nuclei. An overview of those interesting aspects caused via the pair correlation is presented here in the sections titled 'pair correlations in ground states', pair correlations in high spin states' and 'pair correlations in unstable nuclei' focusing on the high spin state. (S. Funahashi)

Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

pair-sending families in the Philippines, this dissertation examines the long-term trajectories of these young Filipinas. It shows how the au pairs’ local and transnational family relations develop over time and greatly influence their life trajectories. A focal point of the study is how au pairs...... that Filipina au pairs see their stay abroad as an avenue of personal development and social recognition, I examine how the au pairs re-position themselves within their families at home through migration, and how they navigate between the often conflicting expectations of participation in the sociality......Since 2000, thousands of young Filipino migrants have come to Denmark as au pairs. Officially, they are there to “broaden their cultural horizons” by living temporarily with a Danish host family, but they also conduct domestic labor in exchange for food and money, which allows them to send...

The top quark has been discovered in 1995 by CDF and D0 collaborations in proton-antiproton collisions at the Tevatron. The amount of data recorded by both experiments makes it possible to accurately measure the properties of this very massive quark. This thesis is devoted to the measurement of the top pair production cross-section via the strong interaction, in a final state composed of two electrons, two particle jets and missing transverse energy. It is based on a 1 fb -1 data set collected by the D0 experiment between 2002 and 2006. The reconstruction and identification of electrons and jets is of major importance in this analysis, and have been studied in events where a Z boson is produced together with one or more jets. The Z+jets process is indeed the dominant physics background to top pair production in the dielectron final state. The measured value for the cross-section is (by assuming a mass of 170 GeV for the top quark): σ(pp-bar → tt-bar) equals (9.6 +3.2 -2.7 (stat) ± 1.0 (syst) +0.8 -0.7 (lumi)) pb. This value agrees well with the expected value given by the standard model (7.9 ± 0.9) pb The primary goal of this cross-section measurement was to verify Standard Model predictions. In this document, this result is also interpreted to indirectly extract the top quark mass. Moreover, the cross-section measurement is sensitive to new physics such as the existence of a charged Higgs boson. The selection established for the cross-section analysis has been used to search for a H + boson lighter than the top quark, where the latter can decay into a W + or H + boson and a b quark. The model that has been studied makes the assumption that the H + boson can only decay into a tau lepton and a neutrino

Electron-positron pair production by a hard photon moving almost parallelly to the crystallographic axis or monocrystal plane is considered. Calculation is conducted of the production differential by the energies of pair components and total cross section of pair production in the case when primary photon moved at a small angle THETA 0 m 2 /U [ru

International Acer Incorporated, Hsin Chu, Taiwan Aerospace Industrial Development Corporation, Taichung, Taiwan American Institute of Taiwan, Taipei, Taiwan...Singapore and Malaysia .5 - 4 - The largest market for semiconductor products is the high technology consumer electronics industry that consumes up...Singapore, and Malaysia . A new semiconductor facility costs around $3 billion to build and takes about two years to become operational

Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

Results of a search for the standard model Higgs boson produced in association with a top quark pair ($\\mathrm{ t \\bar{t} H }$) in final states with electrons, muons, and hadronically decaying $\\tau$ leptons are presented. The analyzed data set corresponds to an integrated luminosity of 35.9 fb$^{-1}$ recorded in proton-proton collisions at $\\sqrt{s} = $ 13 TeV by the CMS experiment in 2016. The sensitivity of the search is improved by using matrix element and machine learning methods to separate the signal from backgrounds. The measured signal rate amounts to 1.23$^{+0.45}_{-0.43}$ times the production rate expected in the standard model, with an observed (expected) significance of 3.2$\\sigma$ (2.8$\\sigma$), which represents evidence for $\\mathrm{ t \\bar{t} H }$ production in those final states. An upper limit on the signal rate of 2.1 times the standard model production rate is set at 95% confidence level.

The production of prompt electron-positron pairs in 16 GeV/c π - p collisions has been measured using the LASS spectrometer at SLAC. An excess of events is observed above the estimated contributions of direct and Dalitz decay of known resonances in the kinematic range defined by 0.1 less than or equal to x less than or equal to 0.45, 0 less than or equal to P/sub T/ less than or equal to 0.8 GeV/c and 0.2 less than or equal to M(e + e - ) less than or equal to 0.7 GeV/c 2 . The excess signal decreases slowly with increasing M, but exhibits very steep x and P/sub T/ 2 dependence. The contribution of this signal to the e + e - /π + π - and γ/π ratios is discussed. Detailed comparisons are made between e + e - distributions and the corresponding low mass μ + μ - distributions, and a simple production mechanism is proposed which describes the 16 GeV/c data well. The implications for direct photon production are presented, and it is shown that the model provides simultaneously a good description of the experimental data on the (e/π) and (μ/π) ratios for p/sub T/ < 1 GeV/c

The production of prompt electron-positron pairs in 16 GeV/c ..pi../sup -/p collisions has been measured using the LASS spectrometer at SLAC. An excess of events is observed above the estimated contributions of direct and Dalitz decay of known resonances in the kinematic range defined by 0.1 less than or equal to x less than or equal to 0.45, 0 less than or equal to P/sub T/ less than or equal to 0.8 GeV/c and 0.2 less than or equal to M(e/sup +/e/sup -/) less than or equal to 0.7 GeV/c/sup 2/. The excess signal decreases slowly with increasing M, but exhibits very steep x and P/sub T//sup 2/ dependence. The contribution of this signal to the e/sup +/e/sup -//..pi../sup +/..pi../sup -/ and ..gamma../..pi.. ratios is discussed. Detailed comparisons are made between e/sup +/e/sup -/ distributions and the corresponding low mass ..mu../sup +/..mu../sup -/ distributions, and a simple production mechanism is proposed which describes the 16 GeV/c data well. The implications for direct photon production are presented, and it is shown that the model provides simultaneously a good description of the experimental data on the (e/..pi..) and (..mu../..pi..) ratios for p/sub T/ < 1 GeV/c.

The neutrino emission due to formation and breaking of Cooper pairs of protons in superconducting cores of neutron stars is considered with taking into account the electromagnetic coupling of protons to ambient electrons. It is shown that collective response of electrons to the proton quantum transition contributes coherently to the complete interaction with a neutrino field and enhances the neutrino-pair production. Our calculation shows that the contribution of the vector weak current to the ννbar emissivity of protons is much larger than that calculated by different authors without taking into account the plasma effects. Partial contribution of the pairing protons to the total neutrino radiation from the neutron star core is very sensitive to the critical temperatures for the proton and neutron pairing. We show domains of these parameters where the neutrino radiation, caused by a singlet-state pairing of protons is dominating

Based on the Bardeen Cooper Schrieffer (BCS) theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the produced photon pairs can be used to violate a Bell inequality, unambiguously demonstrating the entanglement of the split Cooper pairs.

Based on the Bardeen-Cooper-Schrieffer theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the photon pairs produced can be used to violate a Bell inequality, unambiguously demonstrating the entanglement of the split Cooper pairs.

We discuss pairing signatures in mesoscopic nanowires with a variable attractive pairing interaction. Depending on the wire length, density, and interaction strength, these systems realize a simultaneous bulk-to-mesoscopic and BCS-BEC crossover, which we describe in terms of the parity parameter that quantifies the odd-even energy difference and generalizes the bulk Cooper pair binding energy to mesoscopic systems. We show that the parity parameter can be extracted from recent measurements of conductance oscillations in SrTiO3 nanowires by Cheng et al. [Nature (London) 521, 196 (2015), 10.1038/nature14398], where it marks the critical magnetic field that separates pair and single-particle currents. Our results place the experiment in the fluctuation-dominated mesoscopic regime on the BCS side of the crossover.

This paper is divided in two main sections focusing on different aspects of collective nuclear behavior. In the first section, solutions are considered for the collective pairing Hamiltonian. In particular, an approximate solution at the critical point of the pairing transition from harmonic vibration (normal nuclear behavior) to deformed rotation (superconducting behavior) in gauge space is found by analytic solution of the Hamiltonian. The eigenvalues are expressed in terms of the zeros of Bessel functions of integer order. The results are compared to the pairing bands based on the Pb isotopes. The second section focuses on the experimental search for the Giant Pairing Vibration (GPV) in nuclei. After briefly describing the origin of the GPV, and the reasons that the state has remained unidentified, a novel idea for populating this state is presented. A recent experiment has been performed using the LIBERACE+STARS detector system at the 88-Inch Cyclotron of LBNL to test the idea. (Author)

Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.

Many factors affect the graft and patient survival on the renal transplant outcome. These factors depend so much of the recipient and donor. We accomplished a study trying to circumvent factors that depend on the donor. We checked the paired kidneys originating of a same donor cadaver. We examined the risk factors in the evolution and follow-up in 278 couples of kidney transplant. We describe their differences, significance, the graft and patient survival, their functionality in 3 and 5 years and the risk factors implicated in their function. We study immunogenic and no immunogenic variables, trying to explain the inferior results in the grafts that are established secondly. We regroup the paired kidneys in those that they did not show paired initial function within the same couple. The results yield a discreet deterioration in the graft and patient survival for second group establish, superior creatinina concentration, without obtaining statistical significance. The Cox regression study establishes the early rejection (inferior to three months) and DR incompatibility values like risk factors. This model of paired kidneys would be able to get close to best-suited form for risk factors analysis in kidney transplant from cadaver donors, if more patients examine themselves in the same way. The paired kidneys originating from the same donor do not show the same function in spite of sharing the same conditions of the donor and perioperative management.

Coupled cluster theory with single and double excitations accurately describes weak electron correlation but is known to fail in cases of strong static correlation. Fascinatingly, however, pair coupled cluster doubles (p-CCD), a simplified version of the theory limited to pair excitations that preserve the seniority of the reference determinant (i.e., the number of unpaired electrons), has mean field computational cost and is an excellent approximation to the full configuration interaction (FCI) of the paired space provided that the orbital basis defining the pairing scheme is adequately optimized. In previous work, we have shown that optimization of the pairing scheme in the seniority zero FCI leads to a very accurate description of static correlation. The same conclusion extends to p-CCD if the orbitals are optimized to make the p-CCD energy stationary. We here demonstrate these results with numerous examples. We also explore the contributions of different seniority sectors to the coupled cluster doubles (CCD) correlation energy using different orbital bases. We consider both Hartree-Fock and Brueckner orbitals, and the role of orbital localization. We show how one can pair the orbitals so that the role of the Brueckner orbitals at the CCD level is retained at the p-CCD level. Moreover, we explore ways of extending CCD to accurately describe strongly correlated systems

Controlled pointlike disorder introduced by 2.5-MeV electron irradiation was used to probe the superconducting state of single crystals of CaK (Fe1-xNix) 4As4 superconductor at x =0 and 0.05 doping levels. Both compositions show an increase of the residual resistivity and a decrease of the superconducting transition temperature, Tc, at the rate of d Tc/d ρ (Tc) ≈0.19 K/(μ Ω cm ) for x =0 and 0.38 K/(μ Ω cm ) for x =0.05 , respectively. In the Ni-doped compound (x =0.05 ), the coexisting spin-vortex crystal (SVC) magnetic phase is suppressed at the rate of d TN/d ρ (TN) ≈ 0.16 K/(μ Ω cm ). The low-temperature variation of London penetration depth is well approximated by the power-law function, Δ λ (T ) =A Tn , with n ≈2.5 for x =0 and n ≈1.9 for x =0.05 in the pristine state. Detailed analysis of λ (T ) and Tc evolution with disorder is consistent with two effective nodeless energy gaps in the density of states due to robust s± pairing. Overall the behavior of CaK (Fe1-xNix) 4As4 at x =0 is similar to a slightly overdoped Ba1 -yKyFe2As2 at y ≈ 0.5, and at x =0.05 to an underdoped composition at y ≈ 0.2.

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

In this paper we want to stress the relevance of paired fuzzy sets, as already proposed in previous works of the authors, as a family of fuzzy sets that offers a unifying view for different models based upon the opposition of two fuzzy sets, simply allowing the existence of different types...

We report on relative performance numbers for affine and projective pairings on a dual-core Cortex A9 ARM processor. Using a fast inversion in the base field and doing inversion in extension fields by using the norm map to reduce to inversions in smaller fields, we find a very low ratio of

of charged particles in electromagnetic fields. The linear and nonlinear collective modes in electron-positron plasma have been investigated theoretically [3–6]. Recently, Oohara and Hatakeyama [7] have developed a novel method for generating a pair plasma con- sisting of only negative and positive ions with equal mass ...

Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

chambers used to identify muons traversing all of the inner detector regions without being absorbed. The SM is a relativistic quantum field theory describing twelve fundamental fermions and the interactions between them. These fermions can be grouped into six quarks and six leptons which can be further divided into three generations. All ordinary matter is made of fermions from the first lepton and quark generations while the fermions of the remaining generations can solely be produced in highly energetic particle collisions. Moreover, there are four forces acting between the fundamental particles. Besides gravitation which is not part of the SM, these are the electromagnetic, the strong and weak interaction. Designed in the late 1960s and early 1970s, the SM and the predictions deduced from it have undergone a variety of experimental tests. So far, almost all predictions have been found to be fulfilled. With a mass of 173.3 GeV/c{sup 2}, the top quark is the heaviest particle among the fundamental fermions. It has been discovered in 1995 by the CDF and D0 experiments at Fermilab's proton anti-proton collider Tevatron near Chicago, USA. At the Tevatron and the LHC, top quarks are mainly produced pairwise via the strong interaction. The measurement of the top-quark pair production cross-section at the LHC is one of the first important steps when testing the predictions of the SM at the new energy regime. Moreover, a precise knowledge of the t anti t production cross-section is the basis for interesting measurements in the top-quark sector as well as for searches for physics which cannot be explained in the context of the SM. In this thesis, the first measurement of the top-quark pair production cross-section at √(s)=7 TeV using events with an electron+jets final state is described. The production of top-quark pairs is distinguished from other physics processes by solely employing the kinematic properties of t anti t events. The analyzed dataset has been recorded with

Recently, we studied glucose-nucleobase pairs, a binding motif found in aminoglycoside–RNA recognition. DNA duplexes with glucose as a nucleobase were able to hybridize and were selective for purines. They were less stable than natural DNA but still fit well on regular B-DNA. These results opened up the possible use of glucose as a non-aromatic DNA base mimic. Here, we have studied the incorporation and thermal stability of glucose with different types of anchoring units and alternative apolar sugar-nucleobase pairs. When we explored butanetriol instead of glycerol as a wider anchoring unit, we did not gain duplex thermal stability. This result confirmed the necessity of a more conformationally restricted linker to increase the overall duplex stability. Permethylated glucose-nucleobase pairs showed similar stability to glucoside-nucleobase pairs but no selectivity for a specific nucleobase, possibly due to the absence of hydrogen bonds between them. The three-dimensional structure of the duplex solved by NMR located both, the hydrophobic permethylated glucose and the nucleobase, inside the DNA helix as in the case of glucose-nucleobase pairs. Quantum chemical calculations on glucose-nucleobase pairs indicate that the attachment of the sugar to the DNA skeleton through the OH1 or OH4 positions yields the highest binding energies. Moreover, glucose was very selective for guanine when attached through OH1 or OH4 to the DNA. Finally, we examined DNA polymerase insertion of nucleotides in front of the saccharide unit. KF– polymerase from E. coli inserted A and G opposite glc and 6dglc with low efficiency but notable selectivity. It is even capable of extending the new pair although its efficiency depended on the DNA sequence. In contrast, Bst 2.0, SIII and BIOTAQ™ DNA polymerases seem to display a loop-out mechanism possibly due to the flexible glycerol linker used instead of deoxyribose. PMID:29780486

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

The Dirac-Heisenberg-Wigner formalism is employed to investigate electron-positron pair production in cylindrically symmetric but otherwise spatially inhomogeneous, oscillating electric fields. The oscillation frequencies are hereby tuned to obtain multiphoton pair production in the nonperturbative threshold regime. An effective mass, as well as a trajectory-based semiclassical analysis, is introduced in order to interpret the numerical results for the distribution functions as well as for the particle yields and spectra. The results, including the asymptotic particle spectra, display clear signatures of ponderomotive forces.

minimal generating set of X = UV (A) AEY Implications Suppose (M, M’) is an acyclic Typ, -tent and independent) parallel pair. A timeslice containing...compromise the system if the attacker is willing to pay tremendous amounts of money . (For a detailed analysis of the cost, see [Wein9l 1.) What do we do...example, suppose auditor Alice is asking for a snapshot to verify that the electronic currency in circulation sums correctly. If counterfeiter Bad

The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC

To describe pairing correlations in a fissioning system one commonly projects the BCS wave function separately onto good particle numbers in each fragment in the exit channel, but only onto the total number of particles in the parent system. We propose to interpolate between these limiting situations by the generator-coordinate method with the particle-number difference between the nascent fragments as the generator coordinate. Model calculations are presented for the Hill-Wheeler-box potential with a δ-function diaphragm to mimic scission

Ethnographers are increasingly making use of Facebook to acquire access and general acquaintance with their field of study. However, little has been written on how Facebook is used methodologically in research that does not have social media sites as the main focus of interest. This article argues...... the au pairs resist and embrace such dominant representations, and on how such representations are ascribed different meanings in the transnational social fields of which the migrant are a part. The article is based on ethnographic fieldwork conducted between 2010 and 2014 in Denmark, the Philippines...

Using a covariant photon propagator (developed by W.B. Campbell) to represent a photon exchange between a magnetic monopole and an electric charge, the first order production amplitudes in a Feynman-Dyson perturbation expansion and the resulting differential cross-sections are calculated for monopole pair creation from: (i) electron positron annihilation, (ii) photon scattering in the presence of a nucleus, and (iii) electron scattering in the presence of a nucleus. This theory does not specify the spin character of magnetic monopoles, so all processes are calculated twice: for spin zero monopoles and for spin one-half monopoles. In the first and last processes the differential cross-sections have sufficiently different dependences on the production angles (associated with the monopoles momenta), so that near threshold experiments could distinguish between whether monopoles are either spin one-half or spin zero entities. For the t'Hooft monopole mass estimate (5-8 x 10 3 GeV) very high energy particle and photon beam sources would be required to achieve threshold for these production processes

The electron-pair density distributions of a series of 25 Fischer carbene complexes of the type (CO){sub 5}Cr=C(X)R (X=H, OH, OCH{sub 3}, NH{sub 2}, NHCH{sub 3} and R=H, CH{sub 3}, CH=CH{sub 2}, Ph, C-CH) are analyzed using the Atoms in Molecules theory. Localization and delocalization indices are used to characterize the electronpairing taking place in the Cr=C---X moiety in these complexes. Electron delocalization between the Cr and C atoms and between the C atom and the X group are related to the {pi}-donor strength of the X group and the degree of back-donation between the chromium pentacarbonyl and the carbene fragments. The results obtained with the Atoms in Molecules theory complement those obtained in a previous study by means of energy and charge decomposition analyses. Electron delocalization between the Cr atom and the X group is consistent with the hypothesis of a weak 3-center 4-electron bonding interaction in the Cr=C-X group of atoms. Except for X=H, {delta}(Cr,X) increases with the decrease of the {pi}-donor character of the X group.

Electron-positron pair production from vacuum in an electromagnetic field created by two counterpropagating focused laser pulses interacting with each other is analyzed. The dependence of the number of produced pairs on the intensity of a laser pulse and the focusing parameter is studied with a

Personal Assessment of Intimacy in Relationships (PAIR) provides systematic information in five types of intimacy: emotional, social, sexual, intellectual and recreational. PAIR can be used with couples in marital therapy and enrichment groups. (Author)

In this paper, we study the Klein tunneling phenomenon with electron-positron pair creation process. Pairs can be created from the vacuum by a supercritical single-well potential (for electrons). In the time region, the time-dependent growth pattern of the created pairs can be characterized by four distinct regimes which can be considered as four different statuses of the single well. We find that if positrons penetrate the single well by Klein tunneling in different statuses, the total number of the tunneling positrons will be different. If Klein tunneling begins at the initial stage of the first status i.e. when the sing well is empty, the tunneling process and the total number of tunneling positrons are similar to the traditional Klein tunneling case without considering the pair creation process. As the tunneling begins later, the total tunneling positron number increases. The number will finally settle to an asymptotic value when the tunneling begins later than the settling-down time t s of the single well which has been defined in this paper.

Jan 27, 2016 ... Several QSO pairs have been reported and their redshifts determined, where the two objects in each pair are located across an active galaxy. The usually accepted explanation of such occurrences is that the pair is ejected from the parent galaxy. Currently interpreted redshifted spectra for both the QSOs ...

A many-body approach to hadron structure is presented, in which we consider two parton species: spin-0 (b-partons), and spin-1/2 (f-partons). We extend a boson and a fermion pairing scheme for the b-, and f-partons respectively, into a Yang-Mills gauge theory. The main feature of this theory is that the gauge field is not identified with the usual gluon field variable in QCD. We study the confinement problem of the hadron constituents, and obtain, for low temperatures, partons that are confined by energy gaps. As the critical temperatures for the corresponding phase transitions are approached, the energy gap gradually disappears, and confinement is lost. The theory goes beyond the non-relativistic harmonic oscillator quark model, in the sense of giving physical reasons why a non-relativistic approximation is adequate in describing the internal dynamics of hadron structure. (author)

E-commerce is a very active field of Intemet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies,protocols and techniques are involved in the deployment of the security. The related standards and protocols ofe-commerce are studied in this paper. The general model of e-commerce security is set forth.In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secureelectronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented.

This dissertation contains a collection of individual articles on various topics. Their significance in the corresponding field as well as connections between them are emphasized in a general and comprehensive introduction. In the first article, the author explores the consequences for macroscopic effective Lagrangians of assuming that the momentum density is proportional to the flow of conserved current. The universal corrections obtained for the macroscopic Lagrangian of a superconductor describe the London Hall effect, and provide a fully consistent derivation of it. In the second article, a heuristic principle is proposed for quantized Hall states: the existence and incompressibility of fractionally quantized Hall states is explained by an argument based on an adiabatic localization of magnetic flux, the process of trading uniform flux for an equal amount of fictitious flux attached to the particles. This principle is exactly implemented in the third article. For a certain class of model Hamiltonians, the author obtains Laughlin's Jastrow type wave functions explicitly from a filled Landau level, by smooth extrapolation in quantum statistics. The generalization of this analysis to the torus geometry shows that theorems restricting the possibilities of quantum statistics on closed surfaces are circumvented in the presence of a magnetic field. In the last article, the existence is proposed of a novel incompressible quantum liquid, a paired Hall state, at a half filled Landau level. This state arises adiabatically from free fermions in zero magnetic field, and reduces to a state previously proposed by Halperin in the limit of tightly bound pairs. It supports unusual excitations, including neutral fermions and charge e/4 anyons with statistical parameter θ = π/8

This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

Vinyl ethers were prepared by the well-known Favorskii-Shostakovskii method. The purity of the compounds was controlled by GLC and by the PMR and /sup 13/C NMR spectra. The proximity of sp/sup 7/-hybridized unshared pair of oxygen atoms result in a secondary, positive contribution in the constant of spin-spin interaction between neighboring carbon nuclei in the aromatic ring.

Collective measurements on large quantum systems together with a majority voting strategy can lead to a violation of the Clauser-Horne-Shimony-Holt Bell inequality. In the presence of many entangled pairs, this violation decreases quickly with the number of pairs and vanishes for some critical pair number that is a function of the noise present in the system. Here we show that a different binning strategy can lead to a more substantial Bell violation when the noise is sufficiently small. Given the relation between the critical pair number and the source noise, we then present an experiment where the critical pair number is used to quantify the quality of a high visibility photon pair source. Our results demonstrate nonlocal correlations using collective measurements operating on clusters of more than 40 photon pairs.

The use of soluble salts of polyoxometalates (d0-early-transition metal oxygen-anion clusters or POMs) as selective oxidation or electron-transfer catalysts, as probes in physical-organic and biological chemistry, and in the study of electron-and energy-transfer phenomena constitutes a substantial and rapidly growing literature. While rarely addressed, however, POM...

This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

A search for vector-like quarks is presented, which targets their decay into a $Z$ boson and a third-generation Standard Model quark. In the case of a vector-like quark $T$ ($B$) with charge $+2/3e$ ($-1/3e$), the decay searched for is $T \\rightarrow Zt$ ($B \\rightarrow Zb$). Data for this analysis were taken during 2015 and 2016 with the ATLAS detector at the Large Hadron Collider and correspond to 36.1 fb$^{-1}$ of $pp$ collisions at $\\sqrt{s} = 13$ TeV. The final state used is characterized by the presence of a $Z$ boson with high transverse momentum, which is reconstructed from a pair of opposite-sign same-flavor leptons, as well as $b$-tagged jets. Pair- and single-production of vector-like quarks are both taken into account and are each searched for using optimized dileptonic exclusive and trileptonic inclusive event selections. In these selections, the high scalar sum of jet transverse momenta, the presence of high-transverse-momentum large-radius jets, as well as - in the case of the single-production...

The planned generation of lasers and heavy-ion colliders renews the hope to see electron-positron pair creation in strong classical fields. This old prediction is usually referred to as spontaneous pair creation. We observe that both heavy-ion collisions and pair creation in strong laser fields, are instances of the theory of adiabatic pair creation. We shall present the theory, thereby correcting earlier results. We give the momentum distribution of created pairs in overcritical fields. We discuss carefully the proposed experimental verifications and conclude that pure laser-based experiments are highly questionable. We propose a new experiment, joining laser fields and heavy ions, which may be feasible with present-day technology and which may indeed verify the theoretical prediction of adiabatic pair creation. Our presentation relies on recent rigorous works in mathematical physics. (authors)

Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

DNA molecules such as artificial DNAzymes and DNA machines. In addition, the metallo-base pairing system is a powerful tool for the construction of homogeneous and heterogeneous metal arrays, which can lead to DNA-based nanomaterials such as electronic wires and magnetic devices. Recently researchers have investigated these systems as enzyme replacements, which may offer an additional contribution to chemical biology and synthetic biology through the expansion of the genetic alphabet.

We generalize the concept of Berry connection of the single-electron band structure to that of a two-particle Cooper pairing state between two Fermi surfaces with opposite Chern numbers. Because of underlying Fermi surface topology, the pairing Berry phase acquires nontrivial monopole structure. Consequently, pairing gap functions have topologically protected nodal structure as vortices in the momentum space with the total vorticity solely determined by the pair monopole charge qp. The nodes of gap function behave as the Weyl-Majorana points of the Bogoliubov-de Gennes pairing Hamiltonian. Their relation with the connection patterns of the surface modes from the Weyl band structure and the Majorana surface modes inside the pairing gap is also discussed. Under the approximation of spherical Fermi surfaces, the pairing symmetry are represented by monopole harmonic functions. The lowest possible pairing channel carries angular momentum number j =|qp|, and the corresponding gap functions are holomorphic or antiholomorphic functions on Fermi surfaces. After projected on the Fermi surfaces with nontrivial topology, all the partial-wave channels of pairing interactions acquire the monopole charge qp independent of concrete pairing mechanism.

Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710. Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally… …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

This patent describes an electron emitting device for use in an electron discharge system. It comprises: a filament having a pair of terminal ends, electrical supply means for supplying electrical power to the terminal ends of the filament for directly heating the filament by the passage of an electrical current along the filament between the terminal ends, the filament being substantially tapered in cross section continuously in one direction from one of its pair of terminal ends to another of its pair of terminal ends to achieve uniform heating of the filament along the length thereof by compensating for the nonuniform current along the filament due to the emission of electrons therefrom

We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol. We show that security is guaranteed by the entanglement between down-converted pairs, and can be checked by either direct comparison of Alice and Bob's measurement results or evaluation of an inequality of the sort proposed by Mancini et al. [Phys. Rev. Lett. 88, 120401 (2002)

Neutron star magnetic fields may have polar caps (PC) that are offset from the dipole axis, through field-line sweepback near the light cylinder or non-symmetric currents within the star. The effects of such offsets on electron-positron pair cascades are investigated, using simple models of dipole magnetic fields with small distortions that shift the PCs by different amounts or directions. Using a Monte Carlo pair cascade simulation, we explore the changes in the pair spectrum, multiplicity and energy flux across the PC, as well as the trends in pair flux and pair energy flux with spin-down luminosity, L(sub sd). We also give an estimate of the distribution of heating flux from returning positrons on the PC for different offsets. We find that even modest offsets can produce significant increases in pair multiplicity, especially for pulsars that are near or beyond the pair death lines for centered PCs, primarily because of higher accelerating fields. Pair spectra cover several decades in energy, with the spectral range of millisecond pulsars (MSPs) two orders of magnitude higher than for normal pulsars, and PC offsets allow significant extension of all spectra to lower pair energies. We find that the total PC pair luminosity L(sub pair) is proportional to L(sub sd), with L(sub pair) approximates 10(exp -3) L(sub sd) for normal pulsars and L(sub pair) approximates 10(exp -2) L(sub sd) for MSPs. Remarkably, the total PC heating luminosity for even large offsets increases by less than a factor of two, even though the PC area increases by much larger factors, because most of the heating occurs near the magnetic axis.

We propose a concrete model which exhibits ferromagnetism and electron-pair condensation simultaneously. The model is defined on two chains and consists of the electron hopping term, the on-site Coulomb repulsion and a ferromagnetic interaction which describes ferromagnetic coupling between two electrons, one on a bond in a chain and the other on a site in the other chain. It is rigorously shown that the model has fully-polarized ferromagnetic pairing ground states. The higher dimensional version of the model is also presented

in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

Pair coupled cluster doubles (pCCD) has been recently studied as a method capable of accounting for static correlation with low polynomial cost. We present three combinations of pCCD with Kohn–Sham functionals of the density and on-top pair density (the probability of finding two electrons on top of each other) to add dynamic correlation to pCCD without double counting. With a negligible increase in computational cost, these pCCD+DFT blends greatly improve upon pCCD in the description of typical problems where static and dynamic correlations are both important. We argue that—as a black-box method with low scaling, size-extensivity, size-consistency, and a simple quasidiagonal two-particle density matrix—pCCD is an excellent match for pair density functionals in this type of fusion of multireference wavefunctions with DFT.

In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

Full Text Available of the security risks arising from the use of PSDs, and further provides possible security countermeasures to help organisations and users to protect their digital assets. APPROACH Literature review: ? To investigate security risks posed by PSDs... technology in the workplace. International Journal of ElectronicSecurity and Digital Forensics. 3(1): 73?81 [3] Kim, K., Kim, E. & Hong S. (2009). Privacy information protection in portable device. Proceedings of International Conference on Convergence...

Section I The History and Profession of SecurityDefinition, Role, and History of SecuritySecurity Defined The Contexts of Security The Roles of Security The History of SecuritySecurity in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

I describe a search for anomalous production of Z pairs through a new massive resonance X in 2.5-2.9 fb-1 of p$\\bar{p}$ collisions at √s = 1.96 TeV using the CDFII Detector at the Fermilab Tevatron. I reconstruct Z pairs through their decays to electrons, muons, and quarks. To achieve perhaps the most efficient lepton reconstruction ever used at CDF, I apply a thorough understanding of the detector and new reconstruction software heavily revised for this purpose. In particular, I have designed and employ new general-purpose algorithms for tracking at large η in order to increase muon acceptance. Upon analyzing the unblinded signal samples, I observe no X → ZZ candidates and set upper limits on the production cross section using a Kaluza-Klein graviton-like acceptance.

The theory of symmetry-preserving Kramers pair creation operators is reviewed and formulas for applying these operators to configuration interaction calculations are derived. A new and more general type of symmetry-preserving pair creation operator is proposed and shown to commute with the total ...

The $t$-quark is the heaviest elementary particle observed so far (172.9$\\pm$1.5 GeV). Owing to its largest mass, the $t$-quark is believed to have a strong connection with physics beyond the Standard Model (SM). It is thus essential to understand the production and the decay process of the $t$-quark in the context of the SM through a measurement of the $t$-quark pair ($t\\bar{t}$) production cross-section ($\\sigma_{t\\bar{t}}$) at the collider experiment. By using a large number of proton-proton ($pp$) collision data at $\\sqrt{s} = 7$ TeV produced by the Large Hadron Collider (LHC), ATLAS experiment has been measured $\\sigma_{t\\bar{t}}$ in the single-lepton ($t\\bar{t}\\rightarrow \\ell^{+}\

As the first step towards developing noncommutative geometry over Hecke C ∗ -algebras, we study property (RD) (Rapid Decay) for Hecke pairs. When the subgroup H in a Hecke pair (G, H) is finite, we show that the Hecke pair (G, H) has (RD) if and only if G has (RD). This provides us with a family of examples of Hecke pairs with property (RD). We also adapt Paul Jolissant’s works in Jolissaint (J K-Theory 2:723–735, 1989; Trans Amer Math Soc 317(1):167–196, 1990) to the setting of Hecke C ∗ -algebras and show that when a Hecke pair (G, H) has property (RD), the algebra of rapidly decreasing functions on the set of double cosets is closed under holomorphic functional calculus of the associated (reduced) Hecke C ∗ -algebra. Hence they have the same K 0 -groups.

Leapfrogging is a periodic solution of the four-vortex problem with two positive and two negative point vortices all of the same absolute circulation arranged as co-axial vortex pairs. The set of co-axial motions can be parameterized by the ratio 0 vortex pair sizes at the time when one...... pair passes through the other. Leapfrogging occurs for α > σ2, where is the silver ratio. The motion is known in full analytical detail since the 1877 thesis of Gröbli and a well known 1894 paper by Love. Acheson ["Instability of vortex leapfrogging," Eur. J. Phys.21, 269-273 (2000...... pairs fly off to infinity, and a "walkabout" mode, where the vortices depart from leapfrogging but still remain within a finite distance of one another. We show numerically that this transition is more gradual, a result that we relate to earlier investigations of chaotic scattering of vortex pairs [L...

may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

We have calculated the effect of pair breaking on the isotope-effect coefficient (β) of a superconductor. We find that, as the pair-breaking scattering rate is increased, β also increases in absolute value. Values of β much larger than the canonical value of 1/2 can easily be achieved even in models where the electron-phonon interaction contributes only a very small amount to the value of the intrinsic critical temperature

Optical capacitance spectroscopy and thermal annealing of defects have been used to study both the electron traps EP 1 ,E 11 and the dominant hole traps (H 3 -H 4 -H 4 ' ) produced by low-energy electron irradiation in Zn-doped p-type InP. This shows that the 1.1-eV onset in the photoionization cross sections (PCS's) previously attributed to (H 3 -H 4 ) is actually due to the unrelated electron trap EP 1 . The true PCS's σ p 0 of (H 3 ,H 4 ) are compared with PCS tight-binding Green's function calculations to test the earlier proposal that the (H 2 -H 3 -H 4 -H 4 ' ,E 11 ) series might arise from different states of (V P -Zn) complexes. The model yields an effective agreement as concerns both the energy location of the hole-levels series in the forbidden gap and the vanishingly small contribution to the PCS's of the four equivalent L valence-band minima. The proposal that E 11 might correspond to the ionization of an e state of the V P -Zn complex also agrees with the experimental observation of both optical transitions to the valence band and to the conduction band but cannot account for the midgap position of E 11

Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

The general individual (non-coherent) attack on the ping-pong protocol with completely entangled pairs of three-dimensional quantum systems (qutrits) is analyzed. The expression for amount of the eavesdropper's information as functions from probability of attack detection is derived. It is shown, that the security of the ping-pong protocol with pairs of qutrits is higher the security of the protocol with pairs of qubits. It is also shown, that with the use by legitimate users in a control mod...